Computer Security Model Implementations for Computer Science Graduate Students and Researchers. Implementations include the Take-Grant Protection System and a Self-Organized Critical (SOC) Lattice Model for malware behavior.

Project Activity

See All Activity >

Categories

Security

License

MIT License

Follow Computer Security Models

Computer Security Models Web Site

Other Useful Business Software
AI-generated apps that pass security review Icon
AI-generated apps that pass security review

Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Computer Security Models!

Additional Project Details

Intended Audience

Science/Research

Programming Language

Java, Prolog

Related Categories

Prolog Security Software, Java Security Software

Registered

2009-02-08