Model checking security policy model using both UML static and dynamic diagrams
Proceedings of the 4th international conference on Security of information and networks
Trusted subjects configuration based on TE model in MLS systems
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hi-index | 0.00 |
Eight years after the completion of the "SecureComputer Systems" series, basic questions about thatwork are being raised. Is the model useful? Is itoverly restrictive? Are further modeling effortsnecessary to address current problems? This paperaddresses those questions in a personal view of thedevelopment and the utility of the "Secure ComputerSystems" security model.