Specification and verification of the UCLA Unix security kernel
Communications of the ACM
A model for verification of data security in operating systems
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Protection in operating systems
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Hi-index | 0.00 |
"Modeling" in the context of computer security has the same connotation as in the fields of science and engineering, that of an abstraion used for the consideration of a problem of interest. One recent criticism of the Bell-La Padula model confused this notion of "modeling" with a foundational notion of "model" or "interpretation" and, in addition, included intrinsic errors of reasoning.