Login / Signup
Detecting Illicit Leakage of Information in Operating Systems.
Shiuh-Pyng Shieh
Virgil D. Gligor
Published in:
J. Comput. Secur. (1996)
Keyphrases
</>
operating system
computer systems
distributed systems
information sharing
database systems
intrusion detection