Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,724,724 papers from all fields of science
Search
Sign In
Create Free Account
Take-grant protection model
Known as:
Take-Grant
, Take-grant model
The take-grant protection model is a formal model used in the field of computer security to establish or disprove the safety of a given computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Bell–LaPadula model
Biba Model
Computer security
Computer security model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Formal Modeling of Multi-Level Security and Integrity Control Implemented with SELinux
V. Kuliamin
,
A. Khoroshilov
,
Denis Medveded
Actual Problems of Systems and Software…
2019
Corpus ID: 209696529
The paper presents formal security model of Linux distributions provided by Bazealt SPO, which integrates multi-level security…
Expand
2011
2011
Decision-based fuzzy image restoration for noise reduction based on evidence theory
Tzu-Chao Lin
Expert systems with applications
2011
Corpus ID: 30769901
2009
2009
A new method to forecast enrollments using fuzzy time series and clustering techniques
Kurniawan Tanuwijaya
,
Shyi-Ming Chen
International Conference on Machine Learning and…
2009
Corpus ID: 14725132
This paper presents a new method to forecast enrollments using fuzzy time series and clustering techniques. First, we present an…
Expand
2009
2009
TAIEX forecasting based on fuzzy time series and clustering techniques
Kurniawan Tanuwijaya
,
Shyi-Ming Chen
International Conference on Machine Learning and…
2009
Corpus ID: 19396149
Most of the fuzzy forecasting methods based on fuzzy time series used the static length of intervals, i.e., the same length of…
Expand
2005
2005
Ni 50 and Ti – 6 Al – 4 V Using the BAg-8 Braze Alloy
R. Shiue
,
Shyi-Kaan Wu
2005
Corpus ID: 31115291
Microstructure evolution, reaction path and shear strength of infrared brazed Ti50Ni50 shape memory alloy and Ti–6Al–4V joints…
Expand
2005
2005
Sliding mode control of a two-degree-of-freedom helicopter via linear quadratic regulator
Gwo-Ruey Yu
,
Hsuan-Tsung Liu
IEEE International Conference on Systems, Man and…
2005
Corpus ID: 19614247
This paper presents a novel design of flight control for a two-degree-of-freedom helicopter. The design is composed of the…
Expand
2005
2005
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
H. Shahriari
,
Reza Sadoddin
,
R. Jalili
,
Reza Zakeri
,
A. Omidian
International Conference on Information…
2005
Corpus ID: 13914808
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network…
Expand
2000
2000
Temperature dependence of the flow stress and the strain rate sensitivity at the transition from the Peierls mechanism to pinning by localized obstacles
B. Petukhov
,
M. Bartsch
,
U. Messerschmidt
2000
Corpus ID: 67779444
Barriers of very different character such as localized obstacles and the extended Peierls- Nabarro relief may control the…
Expand
1996
1996
Conspiracy and Information Flow in the Take-Grant Protection Model
M. Bishop
Journal of computing and security
1996
Corpus ID: 43911732
The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout…
Expand
1990
1990
Applying the Take-Grant Protection Model
M. Bishop
1990
Corpus ID: 60993260
The Take-Grant Protection Model has in the past been used to model multilevel security hierarchies and simple protection systems…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE