Which Security Policy for Multiplication Smart Cards?
暂无分享,去创建一个
[1] Jean-Louis Lanet,et al. Formal Proof of Smart Card Applets Correctness , 1998, CARDIS.
[2] Joachim Posegga,et al. Byte Code Verification for Java Smart Card Based on Model Checking , 1998, ESORICS.
[3] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[4] ToulouseFrance Colin O'HALLORAN. Formal Validation of Software for Secure Systems , 1995 .
[5] Daniel Le Métayer,et al. Compile-Time Detection of Information Flow in Sequential Programs , 1994, ESORICS.
[6] Dennis M. Volpano,et al. Secure flow typing , 1997, Comput. Secur..
[7] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[8] Pierre Bieber. Formal techniques for an ITSEC-E4 secure gateway , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[9] Frédéric Cuppens,et al. Rules for Designing Multilevel Object-Oriented Databases , 1998, ESORICS.