PPT Slide
- Implements US DoD C2 level security:
- resource owners must be able to control who has access to it
- unique user name and password identification
- audit trail of successful and unsuccessful attempts
- protection from unauthorized tampering of memory contents or files.
- prevent users from randomly or intentionally reusing resources that might contain sensitive information (e.g., page frames, disk blocks)
Security Reference Monitor (SRM)