Cited By
View all- Zhao HLiu XZhao J(2013)Analysis and Improvement of BLP Model for Multi-Level Security DatabaseApplied Mechanics and Materials10.4028/www.scientific.net/AMM.397-400.2536397-400(2536-2539)Online publication date: Sep-2013
- Hanspach MKeller J(2013)In Guards We TrustProceedings of the 2013 International Conference on Social Computing10.1109/SocialCom.2013.87(578-585)Online publication date: 8-Sep-2013
- Yinping ZYulong SQingqi PXining CYahui L(2012)Security Information Flow Control Model and Method in MILSProceedings of the 2012 Eighth International Conference on Computational Intelligence and Security10.1109/CIS.2012.138(591-595)Online publication date: 17-Nov-2012
- Show More Cited By