@inproceedings{4fcad1ee9b7b46c8b745fb205f63fb2b,
title = "Security Policies and Security Models",
abstract = "We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.",
author = "Goguen, \{J. A.\} and J. Meseguer",
note = "Publisher Copyright: {\textcopyright} 1982 IEEE.; 1982 IEEE Symposium on Security and Privacy, SP 1982 ; Conference date: 26-04-1982 Through 28-04-1982",
year = "2012",
month = jul,
day = "6",
doi = "10.1109/SP.1982.10014",
language = "English (US)",
series = "Proceedings - IEEE Symposium on Security and Privacy",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1982",
pages = "11--20",
booktitle = "1982 IEEE Symposium on Security and Privacy, SP 1982",
address = "United States",
edition = "1982",
}