The Craft of System Security by Sean Smith; John Marchesini List of Figures 1.1 An access control matrix 7 1.2 Security and state spaces 10 2.1 Example clearance order 26 2.2 Example categories order 27 2.3 Example MLS lattice 28 2.4 The *-Property
This report was prepared for the U.S. Department of Education under Contract No. EA96055001. The project monitor was Joanne Wiggins in the Planning and Evaluation Service. The views expressed herein are those of the contractor. No official endorseme
The theory of finite automata on finite stings, infinite strings, and trees has had a distinguished history. First, automata were introduced to represent idealized switching circuits augmented by unit delays. This was the period of Shannon, McCullou