Security Policies and Security Models. Goguen, J. A. & Meseguer, J. In 1982 IEEE Symposium on Security and Privacy, pages 11–11, April, 1982. ISSN: 1540-7993
doi  abstract   bibtex   
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
@inproceedings{goguen_security_1982,
	title = {Security {Policies} and {Security} {Models}},
	doi = {10.1109/SP.1982.10014},
	abstract = {We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.},
	booktitle = {1982 {IEEE} {Symposium} on {Security} and {Privacy}},
	author = {Goguen, J. A. and Meseguer, J.},
	month = apr,
	year = {1982},
	note = {ISSN: 1540-7993},
	keywords = {Automata, Computational modeling, Computers, Data models, Finite element methods, Mathematical model, Message systems},
	pages = {11--11},
}

Downloads: 0