Since its inception in the Fall of 1979, … Its uses has exposed many unknown security violations. … that the only security breaches are intended. … in a system, the security level of the … be either active (such as users, processes, and … in terms of: a set of security levels … that maps operation references and state-function values to … As a result the tool is a "conservative …
Google-1
Google-2
Copyright clearance needed for quotation.