This article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer securityWikipedia:WikiProject Computer securityTemplate:WikiProject Computer securityComputer security
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
The first paragraph describes the Take-Grant model as the model for examining protection systems, however the Lipton/Snyders article clearly describes it as a protection system and the article is in fact an examination of the viability of Take-Grant as a protection system.
I will try to come back later and update this, if I get the chance.
If someone else wants to take it on, please feel free, or post your opinion here.
Cthomp17 (talk) 02:50, 24 March 2008 (UTC)
Chris T.[reply]