2004 Volume 21 Issue 6 Pages 482-493
This tutorial paper reviews some major operating system technologies for preventing unauthorized access. To classify and evaluate these technologies, a security taxonomy is introduced. The taxonomy is designed to describe the type of unauthorized access and measure the impact of the unauthorized access. Based on the taxonomy, this paper tries to determine the effectiveness of the operating system technologies for preventing unauthorized access.