Theft and conspiracy in the Take-Grant protection model (Q1168082): Difference between revisions
From MaRDI portal
Changed an Item |
Set profile property. |
||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank |
Revision as of 03:28, 5 March 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Theft and conspiracy in the Take-Grant protection model |
scientific article |
Statements
Theft and conspiracy in the Take-Grant protection model (English)
0 references
1981
0 references
protection in computer systems
0 references
protection state of an operating system
0 references
finite set of graph transformation rules
0 references
safety problem
0 references
protection graph
0 references
Take-Grant transition rules
0 references
linear-time decision procedures
0 references
sharing relationships
0 references
can-steal predicate
0 references
stealing files
0 references
amount of cooperation
0 references
conspiracy
0 references