Skip to main content
Article thumbnail
Location of Repository

A Logical Analysis of Authorized and Prohibited Information Flows



Efforts to define security models have now been un-derway for more than twenty years. The model mus

Year: 2009
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • http://www.rennes.enst-bretagn... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.