Udo Litschauer

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Di erent security policy models have been developed and<lb>published in the past. Proven security policy models, if correctly im-<lb>plemented, guarantee the protection of data objects from unauthorized<lb>access or usage or prevent an illegal information ow. To verify that a<lb>security policy model has been correctly implemented, it is important<lb>to de(More)
  • 1