A logical formalization of secrecy
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Polyinstantation for Cover Stories , 1992, ESORICS.
[2] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[4] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[5] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[7] Frédéric Cuppens,et al. A Logical View of Secure Dependencies , 1992, J. Comput. Secur..
[8] J. Jacob,et al. On the derivation of secure components , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[9] Joshua D. Guttman,et al. What Needs Securing , 1988, CSFW.
[10] Frédéric Cuppens,et al. A definition of secure dependencies using the logic of security , 1991, Proceedings Computer Security Foundations Workshop IV.
[11] Simon S. Lam,et al. Authorization in distributed systems: a formal approach , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.