2016
DOI: 10.1007/978-3-319-41579-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Using Refinement in Formal Development of OS Security Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 7 publications
0
7
0
2
Order By: Relevance
“…One such approach is that all the processes of information security in AS can be described by the subjects' access to clearly defined objects or groups of objects. An example of such approach is Harrison-Ruzzo-Ulman model [2,3]. In this model AS with discretionary access control is described as set of matrices, each of which corresponds to the AS.…”
Section: Reference Security Modelsmentioning
confidence: 99%
See 4 more Smart Citations
“…One such approach is that all the processes of information security in AS can be described by the subjects' access to clearly defined objects or groups of objects. An example of such approach is Harrison-Ruzzo-Ulman model [2,3]. In this model AS with discretionary access control is described as set of matrices, each of which corresponds to the AS.…”
Section: Reference Security Modelsmentioning
confidence: 99%
“…Another approach involves mandatory access control that is often described by terms of Bell LaPadula classical model and special models based on it. [2,3]. Bell automation model presenting AS as an abstract system.…”
Section: информатика и вычислительная техникаmentioning
confidence: 99%
See 3 more Smart Citations