Trusted products evaluation
暂无分享,去创建一个
[1] Jonathan K. Millen. Example of a formal flow violation , 1978, COMPSAC.
[2] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[3] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[4] Leslie Lamport,et al. Latex : A Document Preparation System , 1985 .
[5] F. Meade. A Guide to Understanding Audit in Trusted Systems , 1988 .
[6] Jeffrey Picciotto,et al. Compartmented Model Workstation: Results Through Prototyping , 1987, 1987 IEEE Symposium on Security and Privacy.
[7] Robert S. Fabry,et al. Capability-based addressing , 1974, CACM.
[8] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[9] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[10] K. Thompson. Reflections on trusting trust , 1984, CACM.
[11] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[12] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[13] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[14] O. Sami Saydjari,et al. LOCK trek: navigating uncharted space , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.