decentralized model

  1. D

    White Paper on Decentralized Model for Information Flow Control

    Description The common modelsfor computersecurity are proving inadequate. Security models have two goals: preventing accidental or malicious destruction of information, and controlling the release and propagation of that information. Only the first of these goals is supported well at present, by...
Back
Top