Formal Models for Computer Security
- 1 September 1981
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 13 (3), 247-278
- https://doi.org/10.1145/356850.356852
Abstract
No abstract availableThis publication has 26 references indexed in Scilit:
- Demonstrating Security for Trusted Applications on a Security Kernal BasePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Data SecurityACM Computing Surveys, 1979
- Secure databasesACM Transactions on Database Systems, 1979
- The trackerACM Transactions on Database Systems, 1979
- The transfer of information and authority in a protection systemPublished by Association for Computing Machinery (ACM) ,1979
- Certification of programs for secure information flowCommunications of the ACM, 1977
- Information transmission in computational systemsPublished by Association for Computing Machinery (ACM) ,1977
- A lattice model of secure information flowCommunications of the ACM, 1976
- Third Generation Computer SystemsACM Computing Surveys, 1971