Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,037,674 papers from all fields of science
Search
Sign In
Create Free Account
Bell–LaPadula model
Known as:
Bell-La Padula model
, Tranquility principle
, Bell-LaPadula
Expand
The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Access Control Matrix
Access control
Air gap (networking)
Biba Model
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Flight Dynamics Simulation Modeling and Control of a Large Flexible Tiltrotor Aircraft
O. Juhasz
2014
Corpus ID: 108032280
Abstract : A high order rotorcraft mathematical model is developed and validated against the XV-15 and a Large Civil Tiltrotor…
Expand
Review
2013
Review
2013
Survey of Bell-LaPadula model
Liu Bo
,
Chen Shuhui
,
Deng Jinsheng
2013
Corpus ID: 64207305
This paper firstly discribed the BLP model itself,and summarized the limitaions and problems in its integrity,usability…
Expand
2012
2012
Operational meaning of discord in terms of teleportation fidelity
S. Adhikari
,
Subhashis Banerjee
2012
Corpus ID: 118416180
Quantum discord is a prominent measure of quantum correlations, playing an important role in expanding its horizon beyond…
Expand
2008
2008
MLS security policy evolution with genetic programming
Y. Lim
,
P. Cheng
,
P. Rohatgi
,
John A. Clark
Annual Conference on Genetic and Evolutionary…
2008
Corpus ID: 7431329
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect…
Expand
2004
2004
Security Property Based Administrative Controls
Jon A. Solworth
,
R. Sloan
European Symposium on Research in Computer…
2004
Corpus ID: 8436985
Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change…
Expand
2001
2001
Differentially secure multicasting and its implementation methods
S. Holeman
,
G. Manimaran
,
James Davis
Proceedings Tenth International Conference on…
2001
Corpus ID: 17001741
Though the areas of secure multicast group architecture, key distribution and sender authentication are under scrutiny, one topic…
Expand
1994
1994
The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems
J. McDermott
Database Security
1994
Corpus ID: 18788709
Abstract : We present a mechanism for communication from low to high security classes that allows partial acknowledgments and…
Expand
1988
1988
Histophysiology of the Immune System
S. Fossum
,
B. Rolstad
Advances in Experimental Medicine and Biology
1988
Corpus ID: 32949578
D. Banerjee, J. Baril, D.A. Bell, D. McFarlane, and R. Karim Department of Pathology and Medicine University of western Ontario…
Expand
1984
1984
Comparison Paper between the Bell and LaPadula Model
Tad Taylor
IEEE Symposium on Security and Privacy
1984
Corpus ID: 15499834
This paper provides a brief explanation of the two most cited models in the field of computer security and points out the basic…
Expand
1981
1981
Semiconductor Electrodes XXXIII . Photoelectrochemistry of n‐Type in Acetonitrile
H. White
,
F. Fan
,
A. Bard
1981
Corpus ID: 1205280
Abstract : The photoelectrochemical behavior of n-type WSe2 single crystal electrodes in acetonitrile solutions containing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE