Login / Signup
An algorithmic approach to verification of intransitive non-interference in security policies.
Nejib Ben Hadj-Alouane
Stéphane Lafrance
Feng Lin
John Mullins
Moez Yeddes
Published in:
CDC (2004)
Keyphrases
</>
security policies
access control
network security
distributed systems
security management
security concerns
security requirements
access control systems
access control policies
model checking
home network
fine grained
computer networks
database applications
database
multilevel secure
unauthorized access