Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference7 articles.
1. Cryptography and Data Security;Denning,1982
2. Principles of Data Security;Leiss,1982
3. A linear time algorithm for deciding subject security;Lipton;J. ACM,1977
4. On classes of protection systems;Lipton,1978
5. Theft and conspiracy in the take-grant protection model;Snyder;J. Comput. System Sci.,1981
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献