Girding yourself for the security research battle
暂无分享,去创建一个
[1] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[2] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[3] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[4] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[5] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[6] Ken Frazer,et al. Building secure software: how to avoid security problems the right way , 2002, SOEN.
[7] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[8] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..