security) An operating system security or access control model where specific types of access to a specific object are granted by giving a process this data structure or token.
Last updated: 1998-03-08
Better Than TripAdvisor
- Holiday destination reviews, hotel information,
pictures, sightseeing advice and food reviews.
Updated: Sat May 28 15:15:27 2016
No longer supported by Imperial College Department of Computing
Copyright Denis Howe 1985