Computer Science ›› 2008, Vol. 35 ›› Issue (6): 71-73.

Previous Articles     Next Articles

WU Xian ,QIAN Pei-de (Department of Computer Science and Technology, Suzhou University, Suzhou 215006, China)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Today, people pay more attention to the security of information system. In the process of the research of secure operating system, many security models are proposed. This paper studies BLP model that is mainly used in military department for confidentiali

Key words: Security model, Confidentiality, Integrity, Role

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!