Rule Based Analysis of Computer Security
| dc.contributor.author | Baldwin, Robert W. | en_US |
| dc.date.accessioned | 2023-03-29T15:15:27Z | |
| dc.date.available | 2023-03-29T15:15:27Z | |
| dc.date.issued | 1988-03 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/149665 | |
| dc.description.abstract | Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges. | en_US |
| dc.relation.ispartofseries | MIT-LCS-TR-401 | |
| dc.title | Rule Based Analysis of Computer Security | en_US |
| dc.identifier.oclc | 18430081 |
