TY - GEN
T1 - Security Policies and Security Models
AU - Goguen, J. A.
AU - Meseguer, J.
N1 - Publisher Copyright:
© 1982 IEEE.
PY - 2012/7/6
Y1 - 2012/7/6
N2 - We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
AB - We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
UR - http://www.scopus.com/inward/record.url?scp=84937428379&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84937428379&partnerID=8YFLogxK
U2 - 10.1109/SP.1982.10014
DO - 10.1109/SP.1982.10014
M3 - Conference contribution
AN - SCOPUS:84937428379
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 11
EP - 20
BT - 1982 IEEE Symposium on Security and Privacy, SP 1982
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1982 IEEE Symposium on Security and Privacy, SP 1982
Y2 - 26 April 1982 through 28 April 1982
ER -