Security Policies and Security Models. Goguen, J. A. & Meseguer, J. In 1982 IEEE Symposium on Security and Privacy, pages 11–11, April, 1982. ISSN: 1540-7993doi abstract bibtex We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
@inproceedings{goguen_security_1982,
title = {Security {Policies} and {Security} {Models}},
doi = {10.1109/SP.1982.10014},
abstract = {We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.},
booktitle = {1982 {IEEE} {Symposium} on {Security} and {Privacy}},
author = {Goguen, J. A. and Meseguer, J.},
month = apr,
year = {1982},
note = {ISSN: 1540-7993},
keywords = {Automata, Computational modeling, Computers, Data models, Finite element methods, Mathematical model, Message systems},
pages = {11--11},
}
Downloads: 0
{"_id":"sH6CmPhadA3wiXhbc","bibbaseid":"goguen-meseguer-securitypoliciesandsecuritymodels-1982","author_short":["Goguen, J. A.","Meseguer, J."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Security Policies and Security Models","doi":"10.1109/SP.1982.10014","abstract":"We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.","booktitle":"1982 IEEE Symposium on Security and Privacy","author":[{"propositions":[],"lastnames":["Goguen"],"firstnames":["J.","A."],"suffixes":[]},{"propositions":[],"lastnames":["Meseguer"],"firstnames":["J."],"suffixes":[]}],"month":"April","year":"1982","note":"ISSN: 1540-7993","keywords":"Automata, Computational modeling, Computers, Data models, Finite element methods, Mathematical model, Message systems","pages":"11–11","bibtex":"@inproceedings{goguen_security_1982,\n\ttitle = {Security {Policies} and {Security} {Models}},\n\tdoi = {10.1109/SP.1982.10014},\n\tabstract = {We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.},\n\tbooktitle = {1982 {IEEE} {Symposium} on {Security} and {Privacy}},\n\tauthor = {Goguen, J. A. and Meseguer, J.},\n\tmonth = apr,\n\tyear = {1982},\n\tnote = {ISSN: 1540-7993},\n\tkeywords = {Automata, Computational modeling, Computers, Data models, Finite element methods, Mathematical model, Message systems},\n\tpages = {11--11},\n}\n\n","author_short":["Goguen, J. A.","Meseguer, J."],"key":"goguen_security_1982","id":"goguen_security_1982","bibbaseid":"goguen-meseguer-securitypoliciesandsecuritymodels-1982","role":"author","urls":{},"keyword":["Automata","Computational modeling","Computers","Data models","Finite element methods","Mathematical model","Message systems"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/bxt101","dataSources":["Wsv2bQ4jPuc7qme8R"],"keywords":["automata","computational modeling","computers","data models","finite element methods","mathematical model","message systems"],"search_terms":["security","policies","security","models","goguen","meseguer"],"title":"Security Policies and Security Models","year":1982}