Return to Article Details Using formal security models in secure databases Download Download PDF