Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,064,674 papers from all fields of science
Search
Sign In
Create Free Account
Multilevel security
Known as:
Controlled interface
, Multi-Level Security
, Multi-level secure
Expand
Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Authentication
Bell–LaPadula model
Biba Model
Blacker (security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
A leap-supported, hybrid AR interface approach
H. Regenbrecht
,
J. Collins
,
Simon Hoermann
Australasian Computer-Human Interaction…
2013
Corpus ID: 26727307
We present a novel interface approach which combines 2D video-based AR with a partial voxel model, allowing for more convincing…
Expand
2012
2012
A software platform for fractionated spacecraft
A. Dubey
,
W. Emfinger
,
+7 authors
P. Bose
IEEE Aerospace Conference
2012
Corpus ID: 9800177
A fractionated spacecraft is a cluster of independent modules that interact wirelessly to maintain cluster flight and realize the…
Expand
2009
2009
Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks
G. Mapp
,
F. Shaikh
,
Mahdi Aiash
,
R. M. Vanni
,
M. Augusto
,
E. Moreira
International Conference on Network-Based…
2009
Corpus ID: 6700421
The Next Generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It…
Expand
2008
2008
Identifying Deliberation in Social Movement Assemblies: Challenges of Comparative Participant Observation
Christoph Haug
,
Simon Teune
2008
Corpus ID: 102336731
Contemporary social movements can serve as a critical case for the empirical study of deliberation. In countless face-to-face…
Expand
2005
2005
An approach to human behavior modeling in an air force simulation
Brooke H. McNally
Proceedings of the Winter Simulation Conference…
2005
Corpus ID: 2294060
This paper presents a multi-level approach to incorporating more realistic human behavior models into military simulation…
Expand
2004
2004
Power save mechanisms for multi-hop wireless networks
Matthew J. Miller
,
N. Vaidya
First International Conference on Broadband…
2004
Corpus ID: 1363737
In this paper, we discuss power save mechanisms that allow hosts to go to sleep to conserve energy. When sleeping hosts need to…
Expand
2003
2003
Information Flow in Operating Systems: Eager Formal Methods
J. Guttman
,
Amy L. Herzog
,
John D. Ramsdell
2003
Corpus ID: 13936076
In the 1980s, most of the rigorous work in information security was focused on operating systems, but the 1990s saw a strong…
Expand
1997
1997
Asserting beliefs in MLS relational models
N. Jukic
,
Susan V. Vrbsky
SGMD
1997
Corpus ID: 7260590
Multilevel relations, based on the current multilevel secure (MLS) relational data models, can present a user with information…
Expand
1984
1984
Aminolysis of maleic anhydride kinetics and thermodynamics of amide formation
R. Kluger
,
J. Hunt
1984
Corpus ID: 56214987
The rates of reaction of maleic anhydride with a series of a primary straight-chain amines were measured for solutions at pH 4…
Expand
Highly Cited
1965
Highly Cited
1965
A multi-level technique for optimization
L. Lasdon
,
J. Schoeffler
1965
Corpus ID: 117577937
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE