Extending the creation operation in the Schematic Protection Model
- 4 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 8, 340-348
- https://doi.org/10.1109/csac.1990.143796
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Transformation of access rightsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Transaction control expressions for separation of dutiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Some conundrums concerning separation of dutyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- The demand operation in the schematic protection modelInformation Processing Letters, 1989
- The schematic protection modelJournal of the ACM, 1988
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Unidirectional Transport of Rights and Take–Grant ControlIEEE Transactions on Software Engineering, 1982
- A Linear Time Algorithm for Deciding Subject SecurityJournal of the ACM, 1977
- Operating System Structures to Support Security and Reliable SoftwareACM Computing Surveys, 1976
- Protection in the Hydra Operating SystemPublished by Association for Computing Machinery (ACM) ,1975