The transfer of information and authority in a protection system
暂无分享,去创建一个
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[3] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[4] Richard J. Lipton,et al. A Linear time algorithm for deciding security , 1976, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976).
[5] Richard J. Lipton,et al. A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.
[6] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[7] Richard J. Lipton,et al. The enforcement of security policies for computation , 1975, J. Comput. Syst. Sci..
[8] Lawrence Snyder. Theft and Conspiracy in the Take-Grant Protection Model , 1981, J. Comput. Syst. Sci..
[9] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[10] Anita K. Jones,et al. Protection in programmed systems. , 1973 .