Computer security model

Known as: Security Architecture & Models, Security Architecture and Models 
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
2008
2008
This paper advocates the use of RESTful data services in mobile commerce information spaces. REST is a restriction of web… (More)
  • table 1
  • figure 1
  • figure 4
  • figure 5
Is this relevant?
2004
2004
As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The debates on how to reduce poverty and inequality have focused on two controversial questions. One is whether social policies… (More)
  • table 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Abstract: The protection of personal health information has become a live issue in a number of countries, including the USA… (More)
Is this relevant?
1990
1990
A description is given of computer security models in general and the model of D. Bell and L. LaPadula (Tech. Rep. MTR-2997… (More)
Is this relevant?
Highly Cited
1984
Highly Cited
1984
Military systems that process classified information must operate in a secure manner; i.e., they must adequately protect… (More)
Is this relevant?
Review
1976
Review
1976
or other data are used for any purpose other than a definitely related government procurement operation, the government thereby… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?