Formalisation and implementation of access control models
暂无分享,去创建一个
[1] Leonard J. LaPadula,et al. MITRE technical report 2547, volume II , 1996 .
[2] Len LaPadula,et al. Secure Computer Systems: A Mathematical Model , 1996 .
[3] Paul Douglas,et al. Proceedings International Conference on Information Technology: Coding and Computing , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[4] Damien Doligez,et al. Algorithms and Proofs Inheritance in the FOC Language , 2003, Journal of Automated Reasoning.
[5] E. Gureghian,et al. A full formalisation of the Bell and La Padula security model , 2003 .
[6] Claudia Eckert. On security models , 1996, SEC.
[7] John McLean,et al. The algebra of security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[8] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Hugo Herbelin,et al. The Coq proof assistant : reference manual, version 6.1 , 1997 .