Interactions among secrecy models - (Work-in-progress paper)

[1]  Frédéric Cuppens,et al.  Analyzing consistency of security policies , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[2]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[3]  Luigi Logrippo,et al.  Governance Policies for Privacy Access Control and their Interactions , 2005, FIW.

[4]  Evan H. Magill,et al.  Feature Interactions in Telecommunications and Software Systems VI, May 17-19, 2000, Glasgow, Scotland, UK , 2000, FIW.