Seeing the Real World: Sharing Protected Data in Real Time
暂无分享,去创建一个
[1] David Elliott Bell,et al. Looking back at the Bell-La Padula model , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[2] Nobuko Yoshida,et al. A uniform type structure for secure information flow , 2002, POPL '02.
[3] John James,et al. Flowing valued information based on a need to share , 2011, 2011 IEEE Network Science Workshop.
[4] Edward A. Lee,et al. Structure and interpretation of signals and systems , 2002 .
[5] Kenneth R. Thompson. "GENERAL SYSTEM" DEFINED FOR PREDICTIVE TECHNOLOGIES OF A-GSBT (AXIOMATIC-GENERAL SYSTEMS BEHAVIORAL THEORY) , 2006 .
[6] Pravin Varaiya,et al. Viable Control of Hybrid Systems , 1994, Hybrid Systems.
[7] Simon N. Foley. A model for secure information flow , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[8] Ulrik Brandes,et al. What is network science? , 2013, Network Science.
[9] Michael T. Kleinman,et al. BOARD ON ARMY SCIENCE AND TECHNOLOGY , 1999 .
[10] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] John R. James,et al. Building trustworthy systems: guided state estimation as a feasible approach for interpretation, decision and action based on sensor data , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[12] R. Ross,et al. Guide for the Security Certification And Accreditation of Federal Information Systems , 2004 .
[13] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[14] Li Gong,et al. Java Security: A Ten Year Retrospective , 2009, 2009 Annual Computer Security Applications Conference.
[15] Michael S. Branicky,et al. Introduction to Hybrid Systems , 2005, Handbook of Networked and Embedded Control Systems.
[16] J. Lygeros,et al. AN INTRODUCTION TO HYBRID SYSTEM MODELING ANALYSIS AND CONTROL JOHN LYGEROS GEORGE PAPPAS AND SHANKAR SASTRY , 1999 .
[17] J. James. Thoughts on information operation detection as a nonlinear, mixed-signal identification problem: a control systems view , 2000, CACSD. Conference Proceedings. IEEE International Symposium on Computer-Aided Control System Design (Cat. No.00TH8537).
[18] J. R. James,et al. Tools and techniques for evaluating control architecture , 1999, Proceedings of the 1999 IEEE International Symposium on Computer Aided Control System Design (Cat. No.99TH8404).
[19] Carl E. Landwehr,et al. A security model for military message systems , 1984, TOCS.
[20] Edward A. Lee,et al. INTRODUCING SIGNALS AND SYSTEMS - THE BERKELEY APPROACH , 2000 .
[21] Justin T. Lanahan. Need To Share: Flowing Valued Information and Secure Networking , 2011, 2011 IEEE Network Science Workshop.
[22] Steve Zdancewic,et al. Run-time principals in information-flow type systems , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[23] Jean-Pierre Aubin,et al. Viability theory , 1991 .
[24] William J. Adams,et al. Secure Computer Systems: Extensions to the Bell-La Padula Model , 2009 .
[25] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.