Article,

Conspiracy and Information Flow in the Take-Grant Protection Model.

.
Journal of Computer Security, 4 (4): 331-360 (1996)

Meta data

Tags

Users

  • @dblp

Comments and Reviews