ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
35
views
0
references
Top references
cited by
119
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,048
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Security Policies and Security Models
proceedings-article
Author(s):
J. A. Goguen
,
J. Meseguer
Publication date
(Print):
April 1982
Conference name:
1982 IEEE Symposium on Security and Privacy
Conference date:
May 26, 1982 - May 28, 1982
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Exponential Random Graph Models
Author and article information
Conference
Publication date (Print):
April 1982
Page
: 11
Article
DOI:
10.1109/SP.1982.10014
SO-VID:
c4fb1f98-8a93-446e-8085-935b22365698
Copyright ©
© 1982
Conference name:
1982 IEEE Symposium on Security and Privacy
Conference location:
Oakland, CA, USA
Conference date:
May 26, 1982 - May 28, 1982
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,048
REVIEW ARTICLES INFORMATION, ECONOMIC ANALYSIS AND PUBLIC POLICY
Authors:
D. McL. Lamberton
Gender Mainstreaming of the Security Sector in Bosnia and Herzegovina: From the Policy Papers to Reality
Authors:
Ankica Tomić
FirmwareDroid: Security Analysis of the Android Firmware EcoSystem
Authors:
Thomas Sutter
See all similar
Cited by
119
Language-based information-flow security
Authors:
A. Sabelfeld
,
A.C. Myers
A survey of covert channels and countermeasures in computer network protocols
Authors:
Sebastian Zander
,
Grenville Armitage
,
Philip Branch
Comprehensive formal verification of an OS microkernel
Authors:
Toby Murray
,
Rafal Kolanski
,
Gernot Heiser
…
See all cited by