Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Brewer and Nash model

The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This study analyses two speech events where president Chávez informs that he has incarcerated a judge. He demands the maximum… Expand
Is this relevant?
2013
2013
Among the technological developments pushed by the emergence of 3D Stacked IC technologies, temporary wafer bonding has become a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2008
2008
Given a star operation ∗ of finite type, we call a domain R a ∗-unique representation domain (∗-URD) if each ∗-invertible ∗-ideal… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Two years ago, some of us wrote a paper predicting the demise of “One Size Fits All (OSFA)” [Sto05a]. In that paper, we examined… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2006
2006
On 29 March 2006, a total eclipse of the Sun was visible on the Greek island Kastelorizo (36.150°N, 29.596°E). An extended set of… Expand
Is this relevant?
2006
2006
The pale irides of the Rusty Blackbird (Euphagus carolinus) have often been cited as a useful feature distinguishing this species… Expand
Is this relevant?
2005
2005
The contemporary study of Hebrews is bedeviled by anachronistic assumptions that distort its interpretation. As a result, Hebrews… Expand
Is this relevant?
Highly Cited
1995
Highly Cited
1995
1. Introduction.- 2. Structures of EF-Hand Ca2+-Binding Proteins and Annexins.- 3. Gene Structures and Chromosomal Assignments of… Expand
  • table 1.1
  • table 1.2
  • table 2.3
  • table 2.4
  • figure 3
Is this relevant?
Highly Cited
1989
Highly Cited
1989
  • T. Y. Lin
  • [ Proceedings] Fifth Annual Computer Security…
  • 1989
  • Corpus ID: 206580343
In Brewer and Nash's Chinese Wall security policy model, there is a very strong implicit assumption that the 'conflict of… Expand
Is this relevant?
1970
1970
This study, conducted in central Montana during the summers of 1968 and 1969, was designed to determine the effects of various… Expand
Is this relevant?