Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,614 papers from all fields of science
Search
Sign In
Create Free Account
Computer security model
Known as:
Security Architecture & Models
, Security Architecture and Models
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Access Control Matrix
Access control list
Brewer and Nash model
Capability-based security
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Advances in Model-Driven Security
L. Lucio
,
Qin Zhang
,
+4 authors
Y. L. Traon
Advances in Computing
2014
Corpus ID: 2736739
Review
2011
Review
2011
Digital Rights Management Ecosystem and its Usage Controls: A Survey
Zhiyong Zhang
2011
Corpus ID: 14621045
Progressive and dynamic developments in the digital content industry are significantly dependent on copyright protection…
Expand
2009
2009
Privacy-Preserving Querying in Sensor Networks
Emiliano De Cristofaro
,
Xuhua Ding
,
G. Tsudik
Proceedings of 18th International Conference on…
2009
Corpus ID: 14946186
Wireless Sensor Networks (WSNs) provide sensing and monitoring services by means of many tiny autonomous devices equipped with…
Expand
Highly Cited
2009
Highly Cited
2009
On the Security of Route Discovery in MANETs
M. Burmester
,
B. D. Medeiros
IEEE Transactions on Mobile Computing
2009
Corpus ID: 14275768
Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources, and no…
Expand
2009
2009
A New Client-to-Client Password-Authenticated Key Agreement Protocol
D. Feng
,
Jing Xu
International Workshop on Coding and Cryptology
2009
Corpus ID: 7914359
Client-to-client password-authenticated key agreement (C2C-PAKA) protocol deals with the authenticated key agreement process…
Expand
2008
2008
Modeling and Managing Mobile Commerce Spaces Using RESTful Data Services
S. McFaddin
,
D. Coffman
,
+9 authors
D. Soroker
International Conference on Mobile Data…
2008
Corpus ID: 6924878
This paper advocates the use of RESTful data services in mobile commerce information spaces. REST is a restriction of web…
Expand
Review
2007
Review
2007
Towards realizing a formal RBAC model in real systems
Gail-Joon Ahn
,
Hongxin Hu
ACM Symposium on Access Control Models and…
2007
Corpus ID: 12997444
There still exists an open question on how formal models can be fully realized in the system development phase. The Model Driven…
Expand
2002
2002
A task-based security model to facilitate collaboration in trusted multi-agency networks
S. Aljareh
,
N. Rossiter
ACM Symposium on Applied Computing
2002
Corpus ID: 15382958
Security problems in collaboration work are less well understood than those in the business and defence worlds. Earlier work in…
Expand
1994
1994
Requirements for security in cooperative work: two case studies
G. Coulouris
,
J. Dollimore
1994
Corpus ID: 14529557
The purpose of this work is to provide a source of information about requirements for security and protection in software to…
Expand
Review
1984
Review
1984
Computer Security Models
J. Millen
,
C. Cerniglia
1984
Corpus ID: 58031059
Abstract : The purpose of this report is to provide a basis for evaluating security models in the context of secure computer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required