Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,394,720 papers from all fields of science
Search
Sign In
Create Free Account
Multilevel security
Known as:
Controlled interface
, Multi-Level Security
, Multi-level secure
Expand
Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Authentication
Bell–LaPadula model
Biba Model
Blacker (security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A leap-supported, hybrid AR interface approach
H. Regenbrecht
,
J. Collins
,
Simon Hoermann
Australasian Computer-Human Interaction…
2013
Corpus ID: 26727307
We present a novel interface approach which combines 2D video-based AR with a partial voxel model, allowing for more convincing…
Expand
2012
2012
A software platform for fractionated spacecraft
A. Dubey
,
W. Emfinger
,
+7 authors
P. Bose
IEEE Aerospace Conference
2012
Corpus ID: 9800177
A fractionated spacecraft is a cluster of independent modules that interact wirelessly to maintain cluster flight and realize the…
Expand
2009
2009
Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks
G. Mapp
,
F. Shaikh
,
Mahdi Aiash
,
R. M. Vanni
,
M. Augusto
,
E. Moreira
International Conference on Network-Based…
2009
Corpus ID: 6700421
The Next Generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It…
Expand
2008
2008
Identifying Deliberation in Social Movement Assemblies: Challenges of Comparative Participant Observation
Christoph Haug
,
Simon Teune
2008
Corpus ID: 102336731
Contemporary social movements can serve as a critical case for the empirical study of deliberation. In countless face-to-face…
Expand
Highly Cited
2005
Highly Cited
2005
Multi-level security requirements for hypervisors
P. Karger
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 7956578
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals…
Expand
2005
2005
Using the multilevel imbricated cells topologies in the design of low-power power-factor-corrector converters
F. Forest
,
T. Meynard
,
S. Faucher
,
F. Richardeau
,
J. Huselstein
,
C. Joubert
IEEE transactions on industrial electronics…
2005
Corpus ID: 3098758
Power-factor-corrector (PFC) converters are now commonly used in low-power supply systems connected to AC networks. In addition…
Expand
2003
2003
Information Flow in Operating Systems: Eager Formal Methods
J. Guttman
,
Amy L. Herzog
,
John D. Ramsdell
2003
Corpus ID: 13936076
In the 1980s, most of the rigorous work in information security was focused on operating systems, but the 1990s saw a strong…
Expand
1997
1997
Asserting beliefs in MLS relational models
N. Jukic
,
Susan V. Vrbsky
SGMD
1997
Corpus ID: 7260590
Multilevel relations, based on the current multilevel secure (MLS) relational data models, can present a user with information…
Expand
Review
1979
Review
1979
Applications for multilevel secure operating systems
J. P. Woodward
International Workshop on Managing Requirements…
1979
Corpus ID: 34839247
The need for secure computer systems has been identified in many areas of DoD operations, but in the past these systems have not…
Expand
Highly Cited
1965
Highly Cited
1965
A multi-level technique for optimization
L. Lasdon
,
J. Schoeffler
1965
Corpus ID: 117577937
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE