Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,731,585 papers from all fields of science
Search
Sign In
Create Free Account
Computer security model
Known as:
Security Architecture & Models
, Security Architecture and Models
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Access Control Matrix
Access control list
Brewer and Nash model
Capability-based security
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
K-NN data classification technique using semantic search on encrypted relational data base
Nikita Uttarwar
,
M. A. Pradhan
International Conference on Computing…
2016
Corpus ID: 18814416
Information Mining has wide applications in various sector, like bank sector, medical field and various research centers. Cloud…
Expand
2015
2015
A Study of Access Control for Electronic Health Records
S. Senese
2015
Corpus ID: 166637559
Review
2013
Review
2013
A Survey on data security models in cloud computing
Noman Mazher
,
Imran Ashraf
2013
Corpus ID: 53050864
The world of data computing is becoming larger and complex day by day. Could computing is the most popular model for supporting…
Expand
2013
2013
Study of Access Control Models
Mohammed Ennahbaoui
,
S. Elhajji
2013
Corpus ID: 2124670
The core of a company is its information system, and the least influential problem leads to major damages, requiring the…
Expand
Review
2011
Review
2011
Digital Rights Management Ecosystem and its Usage Controls: A Survey
Zhiyong Zhang
2011
Corpus ID: 14621045
Progressive and dynamic developments in the digital content industry are significantly dependent on copyright protection…
Expand
2011
2011
The Limes Security Model for Information Flow Control
Eckehard Hermann
Sixth International Conference on Availability…
2011
Corpus ID: 9945327
In the business world, the protection of information and data objects and their well-directed flow is essential for the success…
Expand
2008
2008
Key establishment - security models, protocols and usage
Berkant Ustaoglu
2008
Corpus ID: 2486442
Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential…
Expand
2003
2003
Secure Multi-Agent Computations
Regine Endsuleit
,
Thilo Mie
Security and Management
2003
Corpus ID: 15700988
We propose a security model for open multi-agent systems. Given a user-defined task T , we generate a group of mobile agents…
Expand
1994
1994
Requirements for security in cooperative work: two case studies
G. Coulouris
,
J. Dollimore
1994
Corpus ID: 14529557
The purpose of this work is to provide a source of information about requirements for security and protection in software to…
Expand
Review
1984
Review
1984
Computer Security Models
J. Millen
,
C. Cerniglia
1984
Corpus ID: 58031059
Abstract : The purpose of this report is to provide a basis for evaluating security models in the context of secure computer…
Expand