Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,818,225 papers from all fields of science
Search
Sign In
Create Free Account
Bell–LaPadula model
Known as:
Bell-La Padula model
, Tranquility principle
, Bell-LaPadula
Expand
The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
27 relations
Access Control Matrix
Access control
Air gap (networking)
Biba Model
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Full Security of Quantum Key Distribution From No-Signaling Constraints
L. Masanes
,
R. Renner
,
M. Christandl
,
A. Winter
,
J. Barrett
IEEE Transactions on Information Theory
2014
Corpus ID: 1742032
We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a…
Expand
Highly Cited
2006
Highly Cited
2006
Experimental quantum cryptography with qutrits
S. Groeblacher
,
T. Jennewein
,
A. Vaziri
,
G. Weihs
,
A. Zeilinger
2006
Corpus ID: 26728312
We produce two identical keys using, for the first time, entangled trinary quantum systems (qutrits) for quantum key distribution…
Expand
Review
2005
Review
2005
Looking back at the Bell-La Padula model
D. E. Bell
21st Annual Computer Security Applications…
2005
Corpus ID: 1116729
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with…
Expand
Highly Cited
2002
Highly Cited
2002
Optimal teleportation based on bell measurements
S. Albeverio
,
S. Fei
,
Wen-Li Yang
2002
Corpus ID: 9120082
We study optimal teleportation based on Bell measurements. An explicit expression for the quantum channel associated with the…
Expand
1996
1996
The Bell-LaPadula Model
D. Bell
,
L. LaPadula
1996
Corpus ID: 59846227
A conductor bar structure for forming the stator winding of a high-voltage dynamo-electric machine comprises at least one stack…
Expand
Highly Cited
1995
Highly Cited
1995
Modeling Mandatory Access Control in Role-Based Security Systems
M. Nyanchama
,
Sylvia L. Osborn
DBSec
1995
Corpus ID: 10836552
This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic…
Expand
Review
1993
Review
1993
Lattice-based access control models
R. Sandhu
Computer
1993
Corpus ID: 12185903
Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information…
Expand
Highly Cited
1989
Highly Cited
1989
The Chinese Wall security policy
D. Brewer
,
Michael J. Nash
Proceedings. IEEE Symposium on Security and…
1989
Corpus ID: 7882054
The authors explore a commercial security policy (the Chinese Wall) which represents the behavior required of those persons who…
Expand
Highly Cited
1987
Highly Cited
1987
Computer viruses: Theory and experiments
F. Cohen
Comput. Secur.
1987
Corpus ID: 205059769
Highly Cited
1982
Highly Cited
1982
Asymptotic quantization error of continuous signals and the quantization dimension
P. Zador
IEEE Trans. Inf. Theory
1982
Corpus ID: 6428815
Extensions of the limiting qnanfizafion error formula of Bennet are proved. These are of the form D_{s,k}(N,F)=N^{-\beta}B…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE