Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses

Tsau Young Lin. Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses. In Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray, editors, Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA. pages 275-287, Kluwer, 2003.

Abstract

Abstract is missing.