Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Brewer and Nash model

The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Among the technological developments pushed by the emergence of 3D Stacked IC technologies, temporary wafer bonding has become a… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2008
2008
Given a star operation ∗ of finite type, we call a domain R a ∗-unique representation domain (∗-URD) if each ∗-invertible ∗-ideal… 
Highly Cited
2007
Highly Cited
2007
Two years ago, some of us wrote a paper predicting the demise of “One Size Fits All (OSFA)” [Sto05a]. In that paper, we examined… 
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
2006
2006
On 29 March 2006, a total eclipse of the Sun was visible on the Greek island Kastelorizo (36.150°N, 29.596°E). An extended set of… 
Review
2005
Review
2005
The order in which people freely recall a set of words, persons' names, or other items indicates how they organize those items in… 
  • table 1
  • table 2
  • table 2
  • table 2
  • table 3
2005
2005
The contemporary study of Hebrews is bedeviled by anachronistic assumptions that distort its interpretation. As a result, Hebrews… 
Highly Cited
1995
Highly Cited
1995
1. Introduction.- 2. Structures of EF-Hand Ca2+-Binding Proteins and Annexins.- 3. Gene Structures and Chromosomal Assignments of… 
  • table 1.1
  • table 1.2
  • table 2.3
  • table 2.4
  • figure 3
1992
1992
During the late 1970s and early 1980s the Department of Anthropology at the University of Tennessee in Knoxville conducted an… 
  • figure 3
  • table 4
  • table 4
  • figure 4
  • figure 4
Highly Cited
1989
Highly Cited
1989
  • T. Lin
  • [ Proceedings] Fifth Annual Computer Security…
  • 1989
  • Corpus ID: 206580343
In Brewer and Nash's Chinese Wall security policy model, there is a very strong implicit assumption that the 'conflict of… 
1970
1970
This study, conducted in central Montana during the summers of 1968 and 1969, was designed to determine the effects of various…