A DISTRIBUTED SECURE SYSTEM* (Extended Abstract)
暂无分享,去创建一个
[1] Brian Randell,et al. The newcastle connection or UNIXes of the world unite! , 1982, Softw. Pract. Exp..
[2] C L Heitmeyer,et al. Military Message Systems: Requirements and Security Model. , 1982 .
[3] Santosh K. Shrivastava,et al. The Design of a Reliable Remote Procedure Call Mechanism , 1982, IEEE Transactions on Computers.
[4] Gary Grossman,et al. A Practical Executive for Secure Communications , 1982, 1982 IEEE Symposium on Security and Privacy.
[5] John M. Rushby,et al. Proof of separability: A verification technique for a class of a security kernels , 1982, Symposium on Programming.
[6] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[7] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[8] Carl E. Landwehr. A Survey of Formal Models for Computer Security. , 1981 .
[9] JOHN P. L. WOODWARD. Applications for multilevel secure operating systems , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[10] Stephen Thomas Kent. Encryption-based protection for interactive user/computer communication , 1977 .