Login / Signup
The SeaView Security Model.
Teresa F. Lunt
Dorothy E. Denning
Roger R. Schell
Mark R. Heckman
William R. Shockley
Published in:
IEEE Trans. Software Eng. (1990)
Keyphrases
</>
security model
horizontal fragmentation
access control
public key
security analysis
cost model
security requirements
provably secure
authentication and key agreement
designated verifier
public key cryptography
encryption scheme
artificial intelligence
signature scheme
smart card
data model
real time
database