Login / Signup
Specifying and Checking UNIX Security Constraints.
Allan Heydon
J. D. Tygar
Published in:
Comput. Syst. (1994)
Keyphrases
</>
constraint checking
security issues
consistency checking
intrusion detection
security systems
information security
access control
constraint satisfaction
integrity constraints
computer security
objective function
operating system
security policies
linear constraints
authentication protocol