Specifying security constraints with relaxation lattices - Computer

0 downloads 0 Views 429KB Size Report
return to a more preferred behavior. In the security application, faults correspond to breaches in security and integrity, e.g., students modifying a grades file; fixes.

Suggest Documents