A Comment on the 'Basic Security Theorem' of Bell and LaPadula.
John McLeanPublished in: Inf. Process. Lett. (1985)
Keyphrases
- information security
- access control
- security requirements
- data sets
- security issues
- network security
- security policies
- security mechanisms
- computer security
- security problems
- intrusion detection
- functional requirements
- key management
- security measures
- information assurance
- interactive theorem proving
- risk assessment
- data integrity
- security protocols
- security model
- von neumann
- security properties
- high security
- security vulnerabilities