Lattice-based access control: Difference between revisions

Content deleted Content added
Undo non-notable external link
Line 38:
*[[Biba Model]]
*[[Computer security model]]
 
*Trustifier TCB overview [http://www.afcea.org/wiki/index.php?title=Trusted_Computing_Base]
 
[[Category:Computer security models]]