A graph-theoretical model of computer security. Burgess, M., Canright, G., & Engø-Monsen, K. International Journal of Information Security, 3(2):70–85, November, 2004.
Paper doi bibtex @Article{Burgess:2004:GTM,
author = "Mark Burgess and Geoffrey Canright and Kenth
Eng{\o}-Monsen",
title = "A graph-theoretical model of computer security",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "70--85",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0044-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0044-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
Downloads: 0
{"_id":"qpdP3fs2mPLcramJW","bibbaseid":"burgess-canright-engmonsen-agraphtheoreticalmodelofcomputersecurity-2004","author_short":["Burgess, M.","Canright, G.","Engø-Monsen, K."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Mark"],"propositions":[],"lastnames":["Burgess"],"suffixes":[]},{"firstnames":["Geoffrey"],"propositions":[],"lastnames":["Canright"],"suffixes":[]},{"firstnames":["Kenth"],"propositions":[],"lastnames":["Engø-Monsen"],"suffixes":[]}],"title":"A graph-theoretical model of computer security","journal":"International Journal of Information Security","volume":"3","number":"2","pages":"70–85","month":"November","year":"2004","coden":"????","doi":"https://doi.org/10.1007/s10207-004-0044-x","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Tue Jan 23 16:01:23 MST 2018","bibsource":"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"http://link.springer.com/article/10.1007/s10207-004-0044-x","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Burgess:2004:GTM,\n author = \"Mark Burgess and Geoffrey Canright and Kenth\n Eng{\\o}-Monsen\",\n title = \"A graph-theoretical model of computer security\",\n journal = j-INT-J-INFO-SEC,\n volume = \"3\",\n number = \"2\",\n pages = \"70--85\",\n month = nov,\n year = \"2004\",\n CODEN = \"????\",\n DOI = \"https://doi.org/10.1007/s10207-004-0044-x\",\n ISSN = \"1615-5262 (print), 1615-5270 (electronic)\",\n ISSN-L = \"1615-5262\",\n bibdate = \"Tue Jan 23 16:01:23 MST 2018\",\n bibsource = \"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n URL = \"http://link.springer.com/article/10.1007/s10207-004-0044-x\",\n acknowledgement = ack-nhfb,\n fjournal = \"International Journal of Information Security\",\n journal-URL = \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Burgess, M.","Canright, G.","Engø-Monsen, K."],"key":"Burgess:2004:GTM","id":"Burgess:2004:GTM","bibbaseid":"burgess-canright-engmonsen-agraphtheoreticalmodelofcomputersecurity-2004","role":"author","urls":{"Paper":"http://link.springer.com/article/10.1007/s10207-004-0044-x"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","dataSources":["fEXH7XH8oyBtpzKFi"],"keywords":[],"search_terms":["graph","theoretical","model","computer","security","burgess","canright","engø-monsen"],"title":"A graph-theoretical model of computer security","year":2004}