An introduction to database systems: vol. I (4th ed.)
An introduction to database systems: vol. I (4th ed.)
Certification of programs for secure information flow
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
On the implementation of security measures in information systems
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
The enforcement of security policies for computation
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Protection in programmed systems.
Protection in programmed systems.
A model for data secure systems.
A model for data secure systems.
A theory of possibility for decision making
Fuzzy Sets and Systems
Hi-index | 0.00 |
The paper studies correlations between computer security specifications and protection techniques in order to find ways by which architectural features of a computer system corresponding to security specifications may be designed or evaluated. The formal basis of the study begins with two basic models introduced in sections 2.1 and 2.2 of the paper. Study objectives include developing a set of models based on a theory of possibilities for “measuring” strengths and weaknesses of “correlations” between security specifications and protection features.