![]() |
Volumn 4, Issue 4, 1996, Pages 331-359
|
Conspiracy and information flow in the take-grant protection model
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER NETWORKS;
INFORMATION MANAGEMENT;
MATHEMATICAL MODELS;
TAKE GRANT PROTECTION MODEL;
SECURITY OF DATA;
|
EID: 0030376097
PISSN: 0926227X
EISSN: None
Source Type: Journal
DOI: 10.3233/JCS-1996-4404 Document Type: Article |
Times cited : (11)
|
References (16)
|