logodl
arrow New Security Paradigms Workshop
 
arrow Proceedings of the UCLA conference on New security paradigms workshops
September 17 - 20, 1996, Lake Arrowhead, CA USA

access SIGs conferences

A credibility-based model of computer system security
Pages 53-58

Shaw-Cheng Chuang and Paul Wernick

metadata:   index terms  
rule rule rule rule
full text:   pdf 724 KB



back to top
blue HR

INDEX TERMS

Categories and Subject Descriptors:
Computing Methodologies -Simulation and Modeling - Applications (I.6.3); Computing Milieux -Management of Computing and Information Systems - Security and Protection (K.6.5);

General Terms:
Design, Management, Security



blue HR