Now showing items 1-1 of 1
A Protection Model Incorporating Both Authorization and Constraints
(Department of Computer Science, Virginia Polytechnic Institute & State University, 1985), TR-85-30
This paper presents a powerful and flexible protection model which includes both authorizations of open systems and constraints of closed systems. In this model, rules of 'inheritance" determine the authorizations which ...