Employing Secondary and Approximate Authorizations to Improve Access Control Systems - Konstantin Beznosov - Konstantin Beznosov "Employing Secondary and Approximate Authorizations to Improve Access Control Systems," Halifax, NS, Canada, Faculty of Computer Science, Dalhousie University, 12 October, 2006, pp.43.: - LERSSE-PRESENTATION-2006-060
 
<record>
  <controlfield tag="001">122</controlfield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">SAAM</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">JAMES</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">access control</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">Bell-LaPadulla</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">BLP</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">CSAR</subfield>
  </datafield>
  <datafield tag="653" ind1="1" ind2=" ">
    <subfield code="a">access control models and languages</subfield>
  </datafield>
</record>