Abstract
A network of computers is vulnerable to the cascading problem when data of a security level d can be passed to a user with a lower security clearance u elsewhere on the network, without having to defeat any single component of the system that has an accreditation range great enough to allow users of level u and data of level d on a single system. An algorithm of time complexity order
Get full access to this article
View all access options for this article.
