Login / Signup

On the verification of intransitive noninterference in multilevel security.

Nejib Ben Hadj-AlouaneStéphane LafranceFeng LinJohn MullinsMohamed Moez Yeddes
Published in: IEEE Trans. Syst. Man Cybern. Part B (2005)
Keyphrases
  • multilevel security
  • multilevel secure
  • security policies
  • database security
  • access control
  • databases
  • data structure
  • multi dimensional
  • network security
  • transaction management