Login / Signup

Detecting Illicit Leakage of Information in Operating Systems.

Shiuh-Pyng ShiehVirgil D. Gligor
Published in: J. Comput. Secur. (1996)
Keyphrases
  • operating system
  • computer systems
  • distributed systems
  • information sharing
  • database systems
  • intrusion detection