Implementing multilevel security by violation privilege
References (21)
- et al.
Element-level classification with A1 assurance
Comput. Secur.
(1988) Computer security technology study
- et al.
Secure computer systems
Integrity considerations for secure computer design
- et al.
Design of a secure relational database
Computer viruses
Trusted computer system evaluation criteria
CSD-STD-001-83
(August 15, 1983)Password management guidelines
CSD-STD-002-85
(April 12, 1985)A lattice model of secure information flow
Commun. ACM
(1976)- et al.
The tracker: a threat to statistical database security
ACM Trans. Database Syst.
(1980)
There are more references available in the full text version of this article.
Cited by (0)
- ∗
Dr. John M. Carroll is a professor in the Computer Science Department at The University of Western Ontario. He has been active in computer security research since 1968. The second edition of his book, Computer Security, was published by Butterworths in 1987.
Department of Computer Science, The University of Western Ontario, London, Canada N6A 5B7.
Copyright © 1988 Published by Elsevier Ltd.