Login / Signup
Verifying information flow goals in Security-Enhanced Linux.
Joshua D. Guttman
Amy L. Herzog
John D. Ramsdell
Clement W. Skorupka
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
business processes
information flow
information security
flow analysis
operating system
supply chain
information flows
communication networks
functional modules
social networks
open source
process management
organizational structure
flow graph
multi threaded
multi context systems
emergency management
intrusion detection
anomaly detection
software engineering
data sources