×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [bell lapadula]
Distributed database security with discretionary access control
537 views
Information Flow and Covert Channels November, 2006
226 views
1 ISA 662 Information System Security Hybrid Policies Chapter 6 from Bishop ’ s book
215 views
Tuomas Aura T-110.4206 Information security technology Lecture 1: Computer security overview Aalto University, autumn 2011
217 views
Lattices, Confidentiality, BLP Nicolas T. Courtois - University College London
220 views
Lattices, Confidentiality, BLP
87 views