Enriching the Expressive Power of Security Labels.
Li Gong, Xiaolei Qian:
Enriching the Expressive Power of Security Labels.
IEEE Trans. Knowl. Data Eng. 7(5): 839-841(1995)@article{DBLP:journals/tkde/GongQ95,
author = {Li Gong and
Xiaolei Qian},
title = {Enriching the Expressive Power of Security Labels},
journal = {IEEE Trans. Knowl. Data Eng.},
volume = {7},
number = {5},
year = {1995},
pages = {839-841},
ee = {db/journals/tkde/GongQ95.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1995 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 3 Issue 3, TKDE 1993-1995" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- Selim G. Akl, Dorothy E. Denning:
Checking Classification Constraints for Consistency and Completeness.
IEEE Symposium on Security and Privacy 1987: 196-201 BibTeX
- [2]
- ...
- [3]
- ...
- [4]
- ...
- [5]
- ...
- [6]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976) BibTeX
- [7]
- ...
- [8]
- Carl E. Landwehr:
Formal Models for Computer Security.
ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:26 2009