Results 121 to 130 of about 13,471 (161)
Some of the next articles are maybe not open access.

Operational requirements for multilevel security

Proceedings of 9th Annual Computer Security Applications Conference, 2002
Multilevel security (MLS) technology offers capabilities to increase the effectiveness, efficiency, and security of operations that rely on information systems. The US unified and specified combatant commands have been surveyed to identify their operational requirements for MLS and near-term solutions to satisfy the common and most pervasive ...
openaire   +1 more source

Security constraint processing during multilevel secure database design

[1992] Proceedings Eighth Annual Computer Security Application Conference, 2003
By means of simple examples, a design technique for multilevel secure databases is proposed. The design activity covers the conceptual modeling and design phase and consists of the development of secure data schemata and secure function schemata. Data schemata represent the semantics and secrecy properties of data while function schemata describe ...
openaire   +1 more source

Models of Multilevel Computer Security

1989
Publisher Summary Some multilevel access-control models are surveyed in the chapter. This survey includes more recent models and also presents a few models in greater depth. The first access-control models were for operating systems, and modeled the policy by which an operating system grants requests by processes for access to controllable segments ...
openaire   +1 more source

A hookup theorem for multilevel security

IEEE Transactions on Software Engineering, 1990
A security property for trusted multilevel systems, restrictiveness, is described. It restricts the inferences a user can make about sensitive information. This property is a hookup property, or composable, meaning that a collection of secure restrictive systems when hooked together form a secure restrictive composite system.
openaire   +1 more source

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi   +2 more
exaly  

Multilevel security

XRDS: Crossroads, The ACM Magazine for Students, 2004
openaire   +1 more source

Security constraint processing in multilevel secure AMAC schemata

1992
We describe the design environment AMAC which may be used as an aid for the construction of multilevel secure databases. The technique proposed consists of high-level data and security modeling using entity-relationship techniques, a decomposition approach for the construction of single level fragments from multilevel base relations, a supporting ...
openaire   +1 more source

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Van-Linh Nguyen   +2 more
exaly  

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

Home - About - Disclaimer - Privacy