Implementing multilevel security by violation privilege

John M. Carroll. Implementing multilevel security by violation privilege. Computers & Security, 7(6):563-573, 1988. [doi]

Abstract

Abstract is missing.