Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,362,988 papers from all fields of science
Search
Sign In
Create Free Account
Computer security model
Known as:
Security Architecture & Models
, Security Architecture and Models
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Access Control Matrix
Access control list
Brewer and Nash model
Capability-based security
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
K-NN data classification technique using semantic search on encrypted relational data base
Nikita Uttarwar
,
M. A. Pradhan
International Conference on Computing…
2016
Corpus ID: 18814416
Information Mining has wide applications in various sector, like bank sector, medical field and various research centers. Cloud…
Expand
2015
2015
A Study of Access Control for Electronic Health Records
S. Senese
2015
Corpus ID: 166637559
2013
2013
Study of Access Control Models
Mohammed Ennahbaoui
,
S. Elhajji
2013
Corpus ID: 2124670
The core of a company is its information system, and the least influential problem leads to major damages, requiring the…
Expand
Review
2011
Review
2011
Digital Rights Management Ecosystem and its Usage Controls: A Survey
Zhiyong Zhang
2011
Corpus ID: 14621045
Progressive and dynamic developments in the digital content industry are significantly dependent on copyright protection…
Expand
2011
2011
The Limes Security Model for Information Flow Control
Eckehard Hermann
Sixth International Conference on Availability…
2011
Corpus ID: 9945327
In the business world, the protection of information and data objects and their well-directed flow is essential for the success…
Expand
2008
2008
Key establishment - security models, protocols and usage
Berkant Ustaoglu
2008
Corpus ID: 2486442
Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential…
Expand
2003
2003
Secure Multi-Agent Computations
Regine Endsuleit
,
Thilo Mie
Security and Management
2003
Corpus ID: 15700988
We propose a security model for open multi-agent systems. Given a user-defined task T , we generate a group of mobile agents…
Expand
1995
1995
Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler
Peter K. Boucher
,
Raymond K. Clark
,
I. Greenberg
,
E. Jensen
,
D. Wells
1995
Corpus ID: 306412
Some real-time missions that manage classified data are so critical that mission failure might be more damaging to national…
Expand
1994
1994
Requirements for security in cooperative work: two case studies
G. Coulouris
,
J. Dollimore
1994
Corpus ID: 14529557
The purpose of this work is to provide a source of information about requirements for security and protection in software to…
Expand
Review
1984
Review
1984
Computer Security Models
J. Millen
,
C. Cerniglia
1984
Corpus ID: 58031059
Abstract : The purpose of this report is to provide a basis for evaluating security models in the context of secure computer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE