Two secure file servers
暂无分享,去创建一个
[1] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[2] Fred Cohen. A cryptographic checksum for integrity protection , 1987, Comput. Secur..
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[5] Fred Cohen,et al. Design and protection of an information network under a partial ordering: A case study , 1987, Comput. Secur..
[6] Fred Cohen. A secure computer network design , 1985, Comput. Secur..
[7] J. von Neumann,et al. Probabilistic Logic and the Synthesis of Reliable Organisms from Unreliable Components , 1956 .
[8] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[9] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[10] Fred Cohen. Designing provably correct information networks with digital diodes , 1988, Comput. Secur..
[11] Fred Cohen,et al. Design and administration of distributed and hierarchical information networks under partial orderings , 1987, Comput. Secur..
[12] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.
[13] Claude E. Shannon,et al. Reliable Circuits Using Less Reliable Relays , 1956 .