Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,380,507 papers from all fields of science
Search
Sign In
Create Free Account
Multilevel security
Known as:
Controlled interface
, Multi-Level Security
, Multi-level secure
Expand
Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Authentication
Bell–LaPadula model
Biba Model
Blacker (security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A multi-level approach for mobile recommendation of services
Mohamed Boubenia
,
Abdelkader Belkhir
,
F. M. Bouyakoub
International Conference on Intelligent Cloud…
2016
Corpus ID: 9598179
This paper presents a new context-aware approach for the recommendation of services. We estimate that the recommendation of…
Expand
2012
2012
Designing the low cost patient monitoring device (LCPMD) & Ubiquitous based Remote Health Monitoring and Health Management System using Tablet PC
D. Goyal
,
J. Bhaskar
,
Pardeep Singh
2nd IEEE International Conference on Parallel…
2012
Corpus ID: 16545480
At the current point of time, health is the important concern for all the peoples all over the world. So, it is very important…
Expand
2007
2007
A formal model for access control with supporting spatial context
Hong Zhang
,
Yeping He
,
Zhiguo Shi
Science in China Series F: Information Sciences
2007
Corpus ID: 22936878
There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling…
Expand
2005
2005
An approach to human behavior modeling in an air force simulation
Brooke H. McNally
Proceedings of the Winter Simulation Conference…
2005
Corpus ID: 2294060
This paper presents a multi-level approach to incorporating more realistic human behavior models into military simulation…
Expand
Review
2002
Review
2002
Collecting Data From Physicians Via Web-Based Surveys: Recommendations for Improving Response Rates
McKinley Thomas
,
Rebecca G. Rogers
,
R. Maclean
2002
Corpus ID: 54761031
Advances in technology have increased the utility of online data collection strategies. Although this approach to gathering…
Expand
2002
2002
Multi-level secure multicast: the rethinking of secure locks
Oskar Scheikl
,
J. Lane
,
R. Boyer
,
M. Eltoweissy
Proceedings. International Conference on Parallel…
2002
Corpus ID: 52800720
In a secure multicast environment, the distribution of cryptographic keys may be a primary indicator of system performance. The…
Expand
1995
1995
Improving Inter-Enclave Information Flow for a Secure Strike Planning Application
J. Froscher
,
Daivd M. Goldschlag
,
+4 authors
C. Payne
1995
Corpus ID: 15908628
Abstract : DoD operates many system high enclaves with limited information flow between enclaves at different security levels…
Expand
1989
1989
The trusted server approach to multilevel security
T. Hinke
[ Proceedings] Fifth Annual Computer Security…
1989
Corpus ID: 30123439
Suggests the trusted server as a means of injecting multilevel security into applications such as command control and…
Expand
1984
1984
Aminolysis of maleic anhydride kinetics and thermodynamics of amide formation
R. Kluger
,
J. Hunt
1984
Corpus ID: 56214987
The rates of reaction of maleic anhydride with a series of a primary straight-chain amines were measured for solutions at pH 4…
Expand
Highly Cited
1965
Highly Cited
1965
A multi-level technique for optimization
L. Lasdon
,
J. Schoeffler
1965
Corpus ID: 117577937
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE