Security Policies and Security Models

J. A. Goguen, J. Meseguer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.

Original languageEnglish (US)
Title of host publication1982 IEEE Symposium on Security and Privacy, SP 1982
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages11-20
Number of pages10
Edition1982
ISBN (Electronic)0818603453, 0818604107, 0818605324, 0818606290, 9780818603457, 9780818604102, 9780818605321
DOIs
StatePublished - Jul 6 2012
Externally publishedYes
Event1982 IEEE Symposium on Security and Privacy, SP 1982 - Oakland, United States
Duration: Apr 26 1982Apr 28 1982

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
Number1982
Volume1982-July
ISSN (Print)1081-6011

Other

Other1982 IEEE Symposium on Security and Privacy, SP 1982
Country/TerritoryUnited States
CityOakland
Period4/26/824/28/82

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security Policies and Security Models'. Together they form a unique fingerprint.

Cite this