Results 241 to 250 of about 2,449,057 (299)
Some of the next articles are maybe not open access.

Related searches:

Security Policies and Security Models

1982 IEEE Symposium on Security and Privacy, 1982
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
Joseph A. Goguen, José Meseguer 0001
openaire   +1 more source

Security policies for downgrading

Proceedings of the 11th ACM conference on Computer and communications security, 2004
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release (i.e., declassification) where appropriate. This paper presents security policies for downgrading and a security type system that incorporates them, allowing secure ...
Stephen Chong, Andrew C. Myers
openaire   +1 more source

Security Policies for Databases

IFAC Proceedings Volumes, 1992
Abstract This paper discusses advantages and disadvantages of security policies for databases. While database security will be defined by using a broader perspective main attention is given to access control models preventing a database from unauthorized disclosure or modification of information.
G. Pernul, A.M. Tjoa
openaire   +1 more source

Home - About - Disclaimer - Privacy