The Enforcement of Security Policies for Computation
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Gerald J. Popek,et al. Verifiable secure operating system software , 1974, AFIPS '74.
[3] David Lorge Parnas,et al. A technique for software module specification with examples , 1972, CACM.
[4] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[5] Lawrence Robinson,et al. A Provably Secure Operating System. , 1975 .
[6] Charles G. Moore,et al. Potential Capabilities in Algol-Like Programs , 1974 .
[7] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[8] William A. Wulf,et al. HYDRA , 1974, Commun. ACM.
[9] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[10] Anita K. Jones,et al. Protection in programmed systems. , 1973 .
[11] Leo Joseph Rotenberg,et al. Making computers keep secrets , 1973 .
[12] Michael D. Schroeder,et al. Cooperation of mutually suspicious subsystems in a computer utility , 1972 .