Theft and conspiracy in the Take-Grant protection model (Q1168082): Difference between revisions
From MaRDI portal
Removed claim: author (P16): Item:Q291687 |
ReferenceBot (talk | contribs) Changed an Item |
||
(3 intermediate revisions by 3 users not shown) | |||
Property / author | |||
Property / author: Lawrence V. Snyder / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1966364460 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Protection in operating systems / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A Linear Time Algorithm for Deciding Subject Security / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Formal Models of Capability-Based Protection Systems / rank | |||
Normal rank |
Latest revision as of 16:37, 13 June 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Theft and conspiracy in the Take-Grant protection model |
scientific article |
Statements
Theft and conspiracy in the Take-Grant protection model (English)
0 references
1981
0 references
protection in computer systems
0 references
protection state of an operating system
0 references
finite set of graph transformation rules
0 references
safety problem
0 references
protection graph
0 references
Take-Grant transition rules
0 references
linear-time decision procedures
0 references
sharing relationships
0 references
can-steal predicate
0 references
stealing files
0 references
amount of cooperation
0 references
conspiracy
0 references