A model for specifying multi-granularity integrity policies
- 7 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 9 references indexed in Scilit:
- Using mandatory integrity to enforce 'commercial' securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Introduction to the theory of nested transactionsLecture Notes in Computer Science, 1986
- Replication and fault-tolerance in the ISIS systemPublished by Association for Computing Machinery (ACM) ,1985
- Atomic Remote Procedure CallIEEE Transactions on Software Engineering, 1985
- Synchronizing shared abstract typesACM Transactions on Computer Systems, 1984
- Guardians and Actions: Linguistic Support for Robust, Distributed ProgramsACM Transactions on Programming Languages and Systems, 1983
- Non-Discretionery Controls for Commercial ApplicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976