Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,421,615 papers from all fields of science
Search
Sign In
Create Free Account
Take-grant protection model
Known as:
Take-Grant
, Take-grant model
The take-grant protection model is a formal model used in the field of computer security to establish or disprove the safety of a given computer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Bell–LaPadula model
Biba Model
Computer security
Computer security model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Modeling and Verification of Access Rights in Take-Grant Protection Model Using Colored Petri Nets
S. Pashazadeh
2012
Corpus ID: 62642077
Take-Grant protection model (TGPM) is a powerful method for modeling access rights in a wide range of systems. It is graph based…
Expand
Highly Cited
2012
Highly Cited
2012
On-demand dynamic summary-based points-to analysis
Lei Shang
,
Xinwei Xie
,
Jingling Xue
IEEE/ACM International Symposium on Code…
2012
Corpus ID: 1120712
Static analyses can be typically accelerated by reducing redundancies. Modern demand-driven points-to or alias analysis…
Expand
Highly Cited
2010
Highly Cited
2010
Multi-variable fuzzy forecasting based on fuzzy clustering and fuzzy rule interpolation techniques
Shyi-Ming Chen
,
Yu-Chuan Chang
Information Sciences
2010
Corpus ID: 12546726
2005
2005
Ni 50 and Ti – 6 Al – 4 V Using the BAg-8 Braze Alloy
R. Shiue
,
Shyi-Kaan Wu
2005
Corpus ID: 31115291
Microstructure evolution, reaction path and shear strength of infrared brazed Ti50Ni50 shape memory alloy and Ti–6Al–4V joints…
Expand
2000
2000
Temperature dependence of the flow stress and the strain rate sensitivity at the transition from the Peierls mechanism to pinning by localized obstacles
B. Petukhov
,
M. Bartsch
,
U. Messerschmidt
2000
Corpus ID: 67779444
Barriers of very different character such as localized obstacles and the extended Peierls- Nabarro relief may control the…
Expand
1996
1996
Conspiracy and Information Flow in the Take-Grant Protection Model
M. Bishop
Journal of computing and security
1996
Corpus ID: 43911732
The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout…
Expand
1995
1995
Theft of Information in the Take-Grant Protection Model
M. Bishop
Journal of computing and security
1995
Corpus ID: 37000285
Questions of information flow are in many ways more important than questions of access control, because the goal of many security…
Expand
1990
1990
Applying the Take-Grant Protection Model
M. Bishop
1990
Corpus ID: 60993260
The Take-Grant Protection Model has in the past been used to model multilevel security hierarchies and simple protection systems…
Expand
1981
1981
Hierarchical Take-Grant Protection systems
M. Bishop
Symposium on Operating Systems Principles
1981
Corpus ID: 18163939
The application of the Take-Grant Protection Model to hierarchical protection systems is explored. The proposed model extends the…
Expand
1977
1977
On the synthesis and analysis of protection systems
Lawrence Snyder
Symposium on Operating Systems Principles
1977
Corpus ID: 17573712
The design of a protection system for an operating system is seen to involve satisfying the competing properties of richness and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE