Computer Security Technology Planning Study
暂无分享,去创建一个
[1] C. Weissman. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[2] R. M. Graham. Protection in an information processing utility , 1968, CACM.
[3] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[4] Dean Hanawalt Vanderbilt. Controlled information sharing in a computer utility , 1969 .
[5] Ralph L. London. Computer Programs can be Proved Correct , 1970 .
[6] Edsger W. Dijkstra,et al. Notes on structured programming , 1970 .
[7] Theodore D. Friedman,et al. The Authorization Problem in Shared Files , 1970, IBM Syst. J..
[8] Barbara Liskov,et al. The Proof of Correctness Approach to Reliable Systems. , 1971 .
[9] Peter J. Denning,et al. Third Generation Computer Systems , 1971, CSUR.