Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Bell–LaPadula model

Known as: Bell-La Padula model, Tranquility principle, Bell-LaPadula 
The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a… Expand
  • figure 1
  • figure 2
2011
2011
We describe how to combine a minimal Trusted Computing Base (TCB) with polyinstantiated and slightly augmented Commercial Off The… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
We produce two identical keys using, for the first time, entangled trinary quantum systems (qutrits) for quantum key distribution… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
Highly Cited
2001
Highly Cited
2001
Abstract Control Flow Analysis is a static technique for predicting safe and computable approximations to the set of values that… Expand
  • table 1
  • table 2
  • table 4
  • table 5
Highly Cited
1998
Highly Cited
1998
List of Figures. List of Tables. Foreword L. Pols. Preface. 1. Introduction J. van Santen, R. Sproat. 2. Methods and Tools J. van… Expand
1996
1996
A conductor bar structure for forming the stator winding of a high-voltage dynamo-electric machine comprises at least one stack… Expand
Highly Cited
1995
Highly Cited
1995
This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1989
Highly Cited
1989
The authors explore a commercial security policy (the Chinese Wall) which represents the behavior required of those persons who… Expand
  • figure 1
  • figure 2
Highly Cited
1987
Highly Cited
1987
  • F. Cohen
  • Comput. Secur.
  • 1987
  • Corpus ID: 205059769
This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems. Basic… Expand
  • figure 4
  • figure 5
  • figure 11
Highly Cited
1982
Highly Cited
1982
  • P. Zador
  • IEEE Trans. Inf. Theory
  • 1982
  • Corpus ID: 6428815
Extensions of the limiting qnanfizafion error formula of Bennet are proved. These are of the form D_{s,k}(N,F)=N^{-\beta}B… Expand