A 'new' security policy model
- 7 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Concerning 'modeling' of computer securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Using mandatory integrity to enforce 'commercial' securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Implementing commercial data integrity with secure capabilitiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Reasoning About Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Exploiting the Dual Nature of Sensitivity LabelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Design and verification of secure systemsPublished by Association for Computing Machinery (ACM) ,1981
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976