Computer Security Model Implementations for Computer Science Graduate Students and Researchers. Implementations include the Take-Grant Protection System and a Self-Organized Critical (SOC) Lattice Model for malware behavior.

Project Activity

See All Activity >

Categories

Security

License

MIT License

Follow Computer Security Models

Computer Security Models Web Site

Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Computer Security Models!

Additional Project Details

Intended Audience

Science/Research

Programming Language

Java, Prolog

Related Categories

Prolog Security Software, Java Security Software

Registered

2009-02-08