He has 20 years of experience with unix - like operating systems in design , architecture , and implementation 他在类unix操作系统方面有20年的经验,主要研究该操作系统的设计、体系结构和实现等方面。
The environment variable that must be set to enable this search are shown below for some of the common unix operating systems 下面展示了在一些常用的unix操作系统中启用该搜索必须设置的一些环境变量。
For the unix operating system , the active environment will be derived from locale setting including language , territory , and code set 对于unix操作系统,将从地区设置推导出环境,包括语言、区域和编码集。
Because kannel is being developed on linux systems redhat and debian , it can be smoothly ported to other unix - like operating systems 由于kannel是在linux系统( redhat和debian )上开发,所以它可以平滑地移植到其他类unix操作系统。
In this dissertation the integrated and privilege - role extended unix operating system security model , which is based on the blp model , is discussed 在对blp模型进行分析的基础上,提出了以blp模型为基础的完整性和特权角色扩展的unix操作系统安全模型。
Previously , he was involved in writing fiber channel device drivers and developing network processor applications , as well as maintaining unix operating systems 以前,他从事的是编写光纤通道设备驱动程序和开发网络处理器应用程序,以及维护unix操作系统。
This dissertation is focus on the research of the model of secure operating system and the implementation architecture of the security policy on unix operating system platform 本文以unix操作系统为平台,重点对安全操作系统模型和安全策略实现结构进行了研究。
Pyx s chief advantage is in leveraging the rich supply of line - oriented tools , especially under the unix - like operating systems that have emerged over the last 20 years Pyx主要的好处在于能够利用大量的面向行的工具,特别是在过去20年中,在类unix操作系统下发展起来的那些工具。
29 kinds of the privileges for the unix process have been defined in the os kernel . to associate with the subject and the object better , we define the privilege set , which contains one or more privileges 为unix操作系统内核定义了29种进程能够拥有的特权,为了更好地与主体和客体关联,又提出了特权集的概念,将一个或多个特权的集合组成特权集。
After the analysis of the typical instance of the security attack on the unix operating system , it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix 本文通过重点分析针对unix操作系统的一些攻击实例,指出现有的unix操作系统自主访问机制和超级用户特权实现方式是最主要的安全问题。