-
1
Reconstruction of BLP model based on secure subject access
Published 2007-01-01Subjects: “…BLP model…”
Get full text
Article -
2
-
3
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Subjects: Get full text
Article -
4
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Subjects: Get full text
Article -
5
Secret level valuation method of BLP model based on some application properties
Published 2013-09-01Subjects: Get full text
Article -
6
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: Get full text
Article