Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2018.2807793
Abstract: In currently popular access control models, the security policies and regulations never change in the running system process once they are identified, which makes it possible for attackers to find the vulnerabilities in a system,…
read more here.
Keywords:
model based;
system;
bell lapadula;
model ... See more keywords