Map
Index
Random
Help
th

QuoteRef: mcleJ1_1990

topics > all references > ThesaHelp: references m-o



ThesaHelp:
references m-o
Topic:
security by secure domains
Topic:
security by access rights
Topic:
security leaks and weaknesses

Reference

McLean, J., "The specification and modeling of computer security", Computer, January 1990, pp. 9-16. Google

Quotations
9 ;;Quote: mandatory access control limits damage a Trojan horse can do; e.g., military security levels (clearance for classified objects)
10 ;;Quote: computer security concerns unauthorized disclosure, unauthorized alteration, and denial of service
10 ;;Quote: simple security--users and programs not permitted to view data with a higher classification
10+;;Quote: *-property for security--programs not permitted to copy data to a lower classification level
10 ;;Quote: covert channel analysis--bound the rate that high-level input can effect low-level output


Related Topics up

ThesaHelp: references m-o (268 items)
Topic: security by secure domains (45 items)
Topic: security by access rights (38 items)
Topic: security leaks and weaknesses (67 items)

Collected barberCB 6/90
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.