Jun Furukawa

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Access control mechanisms such as access control lists (ACLs)are often used against divulging of sensitive information. However, when this is implemented as apart of a kernel, if someone stole the storage media, he can easily avoid the access control mechanisms. To complement the defect of the access control mechanisms, we designed and implemented an LKM(More)
  • 1