Protection and administration of information networks with partial orderings
暂无分享,去创建一个
[1] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[2] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[3] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[4] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[5] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[6] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .