Skip to main content
Department of Information Technology

Links from the book

Chapter 2: Identification and Authentication

Chapter 4: Security Models

Chapter 15: Multi-Level Secure Databases

(see chapter 14)

Chapter 16: Concurrency Control and Multi-Level Security

Chapter 17: Object-Oriented Security

Updated  2005-09-01 22:23:09 by Björn Victor.