ACM SIGMOD Anthology TKDE dblp.uni-trier.de

Enriching the Expressive Power of Security Labels.

Li Gong, Xiaolei Qian: Enriching the Expressive Power of Security Labels. IEEE Trans. Knowl. Data Eng. 7(5): 839-841(1995)
@article{DBLP:journals/tkde/GongQ95,
  author    = {Li Gong and
               Xiaolei Qian},
  title     = {Enriching the Expressive Power of Security Labels},
  journal   = {IEEE Trans. Knowl. Data Eng.},
  volume    = {7},
  number    = {5},
  year      = {1995},
  pages     = {839-841},
  ee        = {db/journals/tkde/GongQ95.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Copyright © 1995 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 3, TKDE 1993-1995" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
Selim G. Akl, Dorothy E. Denning: Checking Classification Constraints for Consistency and Completeness. IEEE Symposium on Security and Privacy 1987: 196-201 BibTeX
[2]
...
[3]
...
[4]
...
[5]
...
[6]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[7]
...
[8]
Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:26 2009