Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Bell–LaPadula model

Known as: Bell-La Padula model, Tranquility principle, Bell-LaPadula 
The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Cloud computing is one of the emerging technologies that is being used widely these days. It makes use of the computing resources… Expand
  • figure 2
  • figure 3
Is this relevant?
2014
2014
We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
One of us has recently elaborated a theory for modelling concepts that uses the state context property (SCoP) formalism, i.e. a… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We produce two identical keys using, for the first time, entangled trinary quantum systems (qutrits) for quantum key distribution… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
2006
2006
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
1998
Highly Cited
1998
List of Figures. List of Tables. Foreword L. Pols. Preface. 1. Introduction J. van Santen, R. Sproat. 2. Methods and Tools J. van… Expand
Is this relevant?
1996
1996
A conductor bar structure for forming the stator winding of a high-voltage dynamo-electric machine comprises at least one stack… Expand
Is this relevant?
Highly Cited
1989
Highly Cited
1989
The authors explore a commercial security policy (the Chinese Wall) which represents the behavior required of those persons who… Expand
  • figure 1
  • figure 2
Is this relevant?
1984
1984
  • T. Taylor
  • IEEE Symposium on Security and Privacy
  • 1984
  • Corpus ID: 15499834
This paper provides a brief explanation of the two most cited models in the field of computer security and points out the basic… Expand
Is this relevant?
Highly Cited
1982
Highly Cited
1982
Extensions of the limiting qnanfizafion error formula of Bennet are proved. These are of the form D_{s,k}(N,F)=N^{-\beta}B… Expand
Is this relevant?