首页> 美国政府科技报告 >Logical Channel Theory
【24h】

Logical Channel Theory

机译:逻辑信道理论

获取原文

摘要

The theory of prime constraints and its application to security analysis is reviewed, and some examples are given. Different examples illustrate different advantages of the prime constraint approach over previous methods: the ability to recognize the safety of a case of downgrading; the ability to handle non deterministically specified systems; and the ability to avoid assigning security levels to hidden variables. Pcgraph and related tools developed in FY79 were used for the computations in examples. (Author)

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号