Team for Research in
Ubiquitous Secure Technology

Multilevel security models (in The Handbook of Information Security)
Mark Stamp, Ali Hushyar

Citation
Mark Stamp, Ali Hushyar. "Multilevel security models (in The Handbook of Information Security)". Wiley, 2006.

Abstract
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security.The text contains 207 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Electronic downloads

Citation formats  
  • HTML
    Mark Stamp, Ali Hushyar. <a
    href="http://www.truststc.org/pubs/240.html"
    ><i>Multilevel security models (in The Handbook of
    Information Security)</i></a>, Wiley, 2006.
  • Plain text
    Mark Stamp, Ali Hushyar. "Multilevel security models
    (in The Handbook of Information Security)". Wiley, 2006.
  • BibTeX
    @inbook{StampHushyar06_MultilevelSecurityModelsinHandbookOfInformationSecurity,
        author = {Mark Stamp and Ali Hushyar},
        title = {Multilevel security models (in The Handbook of
                  Information Security)},
        publisher = {Wiley},
        year = {2006},
        abstract = {The Handbook of Information Security is a
                  definitive 3-volume handbook that offers coverage
                  of both established and cutting-edge theories and
                  developments on information and computer
                  security.The text contains 207 articles from over
                  200 leading experts, providing the benchmark
                  resource for information security, network
                  security, information privacy, and information
                  warfare. },
        URL = {http://www.truststc.org/pubs/240.html}
    }
    

Posted by Mark Stamp on 23 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.