LEADER 01864nam 2200517 a 450 001 9910702279603321 005 20121018104018.0 035 $a(CKB)5470000002425350 035 $a(OCoLC)813166770 035 $a(EXLCZ)995470000002425350 100 $a20121016d1990 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplying the take-grant protection model$b[electronic resource] /$fMatt Bishop 210 1$aHanover, NH :$cDepartment of Mathematics and Computer Science, Dartmouth College ;$a[Washington, D.C.]:$c[National Aeronautics and Space Administration],$d[1988] 215 $a1 online resource (26 pages) $cillustrations 225 1 $a[NASA contractor report ;$vNASA CR-190439] 225 1 $aTechnical report ;$vPCS-TR90-151 300 $aTitle from title screen (viewed on Oct. 16, 2012). 320 $aIncludes bibliographical references (pages 24-26). 606 $aAccess control$2nasat 606 $aComputer information security$2nasat 606 $aInformation flow$2nasat 606 $aInformation transfer$2nasat 606 $aModels$2nasat 606 $aPolicies$2nasat 606 $aProtection$2nasat 615 7$aAccess control. 615 7$aComputer information security. 615 7$aInformation flow. 615 7$aInformation transfer. 615 7$aModels. 615 7$aPolicies. 615 7$aProtection. 700 $aBishop$b Matt$g(Matthew A.)$01386286 712 02$aUnited States.$bNational Aeronautics and Space Administration. 712 02$aDartmouth College.$bDepartment of Mathematics and Computer Science. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910702279603321 996 $aApplying the take-grant protection model$93435130 997 $aUNINA