HRU

Known as: Harrison-Ruzzo-Ullman model 
The HRU security model (Harrison, Ruzzo, Ullman model) is an operating system level computer security model which deals with the integrity of access… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2017
024619882017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A grid-based version of the Soil and Water Assessment Tool (SWAT) model, SWATgrid, was developed to perform simulations on a… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2012
2012
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service… (More)
Is this relevant?
2011
2011
Soil erosion from agricultural fields is a fundamental water quality and quantity concern throughout the U.S. Watershed models… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2010
2010
In order to achieve a high degree of security, IT systems with sophisticated security requirements increasingly apply security… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
2010
2010
In order to achieve a high degree of security, IT systems with sophisticated security requirements increasingly apply security… (More)
Is this relevant?
2007
2007
This paper describes work on early detection of space launch vehicle failures that could lead to loss of control during ascent… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Trust management is a form of distributed access control using distributed policy statements. Since one party may delegate… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
The access matrix model as formalized by Harrison, Ruzzo, and Ullman (HRU) has broad expressive power. Unfortunately, HRU has… (More)
Is this relevant?
1991
1991
Access control models provide a formalism and framework for specifying control over access to information and other resources in… (More)
  • figure 1
Is this relevant?
1988
1988
In this paper we show that the Schematic Protection Model (SPM) subsumes several well-known protection models as particular… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?