MLA
Lin, Tsau Young. "Chinese Wall Security Policy Model: Granular Computing on DAC Model." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 1096-1107. https://doi.org/10.4018/978-1-59904-937-3.ch075
APA
Lin, T. Y. (2008). Chinese Wall Security Policy Model: Granular Computing on DAC Model. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1096-1107). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch075
Chicago
Lin, Tsau Young. "Chinese Wall Security Policy Model: Granular Computing on DAC Model." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 1096-1107. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch075
Export Reference