COMPSAC   2000 Annual International Computer Software and Applications Conference
Wall of Fame | Most Viewed COMPSAC-2000 Paper
13 years 10 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source177
2Download preprint from source149
3Download preprint from source146
4Download preprint from source133
5Download preprint from source130
6Download preprint from source124
7Download preprint from source115
8Download preprint from source111
9Download preprint from source110
10Download preprint from source108
11Download preprint from source107
12Download preprint from source105
13Download preprint from source104
14Download preprint from source102
15Download preprint from source96
16Download preprint from source94
17Download preprint from source92