Information Security Modeling and Analysis
暂无分享,去创建一个
[1] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[2] Edmund M. Clarke,et al. Model Checking , 1999, Handbook of Automated Reasoning.
[3] Michael W. Whalen,et al. Model Checking Information Flow , 2010, Design and Verification of Microprocessor Systems for High-Assurance Applications.
[4] Matthew Wilding,et al. Formal Verification of Partition Management for the AAMP7G Microprocessor , 2010, Design and Verification of Microprocessor Systems for High-Assurance Applications.
[5] Raymond J. Richards. Modeling and Security Analysis of a Commercial Real-Time Operating System Kernel , 2010, Design and Verification of Microprocessor Systems for High-Assurance Applications.
[6] John Rushby. A Separation Kernel Formal Security Policy in PVS , 2004 .
[7] David S. Hardin. Design and Verification of Microprocessor Systems for High-Assurance Applications , 2010 .
[8] Claude E. Shannon,et al. The Mathematical Theory of Communication , 1950 .
[9] David A. Greve. Parameterized congruences in ACL2 , 2006, ACL2 '06.
[10] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[11] John Rushby. Formal Verification of McMillan's Compositional Assume-Guarantee Rule , 2001 .
[12] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .