Skip to main content
Article thumbnail
Location of Repository

A Logical Analysis of Authorized and Prohibited Information Flows

By 

Abstract

Efforts to define security models have now been un-derway for more than twenty years. The model mus

Year: 2009
OAI identifier: oai:CiteSeerX.psu:10.1.1.135.2829
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.rennes.enst-bretagn... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.