Take-grant protection model
Semantic Scholar uses AI to extract papers important to this topic.
The article contains the algorithm for searching a certain kind of bridges in the protection graph of Take-Grant model. The… (More)
The article discribe methods of verifing the conditions of access in computer systems based on Take-Grant protection model.
Wang Y, Chandra R, Samsa LA, Gooch B, Fee BE, Cook JM, Vigna SR, Grant AO, Liddle RA. Amino acids stimulate cholecystokinin… (More)
We test for firm-level asset investment effects in returns by examining the crosssectional relation between firm asset growth and… (More)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network… (More)
- Journal of Computer Security
The Take Grant Protection Model is a theoretic model of access control that captures the notion of information flow throughout… (More)
Questions of information flow are in many ways more important than questions of access control, because the goal of many security… (More)
The take-grant protection model, as introduced in [3,7,5] and surveyed in [1,2,6], describes the access control facilities for… (More)
- J. Comput. Syst. Sci.
Models of protection in computer systems usually possess two components: a finite, labeled, directed two color graph representing… (More)
The application of the Take-Grant Protection Model to hierarchical protection systems is explored. The proposed model extends the… (More)