Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,217,437 papers from all fields of science
Search
Sign In
Create Free Account
Non-interference (security)
Known as:
Non-interference
Non-interference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Bell–LaPadula model
Computer security model
Information
Language-based security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
THE COMPREHENSIVE STRATEGIC PARTNERSHIP BETWEEN SOUTH AFRICA AND RUSSIA
Deon Geidenhuys
The Strategic Review for Southern Africa
2020
Corpus ID: 148641873
Abstract Following an international trend, South Africa and Russia entered into a "strategic partnership" in 2006 and in 2013…
Expand
2016
2016
Micro-policies for Web Session Security
Stefano Calzavara
,
R. Focardi
,
Niklas Grimm
,
Matteo Maffei
IEEE Computer Security Foundations Symposium
2016
Corpus ID: 746894
Micro-policies, originally proposed to implement hardware-level security monitors, constitute a flexible and general enforcement…
Expand
2009
2009
Dynamic spectrum access using the interference temperature model
T. Clancy
Ann. des Télécommunications
2009
Corpus ID: 5616222
To combat spectral overcrowding, the FCC investigated new ways to manage RF resources. The idea was to let people use licensed…
Expand
2008
2008
Al2O3-coated microcantilevers for detection of moisture at ppm level
Xiaolei Shi
,
Qi Chen
,
Ji Fang
,
Koday Varahramyan
,
H. Ji
2008
Corpus ID: 33076810
Highly Cited
2006
Highly Cited
2006
Unrestricted Transactional Memory: Supporting I/O and System Calls Within Transactions
Comments Comments
,
Colin Blundell
,
E. Lewis
,
Milo M. K. Martin
2006
Corpus ID: 1005509
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs…
Expand
2003
2003
The Capacity of Wireless Networks yz
P. Kumar
2003
Corpus ID: 51798034
When n identical randomly located nodes, each capable of transmitting at W bits/sec and using a xed range, form a wireless…
Expand
Highly Cited
2003
Highly Cited
2003
Interference Analysis for AspectJ
Maximilian Störzer
,
J. Krinke
2003
Corpus ID: 16097814
AspectJ is a language implementing aspect-oriented programming on top of Java. Besides modification of program flow and state…
Expand
1997
1997
Design and Analysis of an Adaptive Policy for Secure Real-Time Locking Protocol
S. Son
,
R. David
,
Craig Chaney
Information Sciences
1997
Corpus ID: 31224645
1996
1996
Non-Interference Properties of a Concurrent Object-Based Language: Proofs Based on an Operational Semantics
S. Hodges
,
Cliff B. Jones
Object Orientation with Parallelism and…
1996
Corpus ID: 37577922
A carefully designed concurrent object-oriented language can provide a suitable target for a compositional design process that…
Expand
1986
1986
The Origins of the Religion Clauses of the Constitution
P. Kurland
1986
Corpus ID: 153435558
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE