Login / Signup
Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture.
Lu'ay A. Wahsheh
Jim Alves-Foss
Published in:
IRI (2007)
Keyphrases
</>
high assurance
access control
policy enforcement
software systems
real time
management system
operating system
enterprise network
distributed systems
fault tolerant
security management
data structure
cooperative
open source
data management