B. Burwell

Learn More
We are interested in multi-level secure networks in which the host systems are required to conform to a multi-level security policy such that information is constrained to flow between hosts only in certain ways. The problem of interest is how to most efficiently block such flows in the face of the threat of untrusted software running on the communication(More)
  • 1