1983
DOI: 10.1109/mc.1983.1654438
|View full text |Cite
|
Sign up to set email alerts
|

Computer Security Technology: Guest Editors' Introduction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

1987
1987
2007
2007

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The past thirty years or more has seen a number of security models developed, meeting complementary requirements for security in computer systems. [10,11] Experimental and "small run" operating systems have been developed and deployed using these models but none, outside the basic "access control list (ACL)" structure has really been accepted in mass market operating systems and allied software products.…”
Section: Themes and Challengesmentioning
confidence: 99%
“…The past thirty years or more has seen a number of security models developed, meeting complementary requirements for security in computer systems. [10,11] Experimental and "small run" operating systems have been developed and deployed using these models but none, outside the basic "access control list (ACL)" structure has really been accepted in mass market operating systems and allied software products.…”
Section: Themes and Challengesmentioning
confidence: 99%