Take-grant protection model

Known as: Take-Grant Model, Take-grant 
The take-grant protection model is a formal model used in the field of computer security to establish or disprove the safety of a given computer… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1967-2017
051019672017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
The article contains the algorithm for searching a certain kind of bridges in the protection graph of Take-Grant model. The… (More)
  • figure 1
  • figure 2
Is this relevant?
2012
2012
The article discribe methods of verifing the conditions of access in computer systems based on Take-Grant protection model. 
Is this relevant?
2011
2011
Wang Y, Chandra R, Samsa LA, Gooch B, Fee BE, Cook JM, Vigna SR, Grant AO, Liddle RA. Amino acids stimulate cholecystokinin… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We test for firm-level asset investment effects in returns by examining the crosssectional relation between firm asset growth and… (More)
  • figure 1
  • figure 2
  • figure 3
  • table IV
  • table IV
Is this relevant?
2005
2005
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1996
1996
The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout… (More)
  • figure 1
  • figure 2
  • figure 2
  • figure 3
  • figure 3
Is this relevant?
1988
1988
Questions of information flow are in many ways more important than questions of access control, because the goal of many security… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
Is this relevant?
Review
1984
Review
1984
The take-grant protection model, as introduced in [3,7,5] and surveyed in [1,2,6], describes the access control facilities for… (More)
Is this relevant?
1981
1981
Models of protection in computer systems usually possess two components: a finite, labeled, directed two color graph representing… (More)
Is this relevant?
1981
1981
The application of the Take-Grant Protection Model to hierarchical protection systems is explored. The proposed model extends the… (More)
  • figure 3.2
  • figure 4.1
  • figure 4,2
  • figure 4.2
  • figure 5
Is this relevant?