Return to Article Details Multilevel Security Models in Real-Time Database Systems: Comparing and Analyzing Download Download PDF