Redundant access rights
暂无分享,去创建一个
[1] Brian W. Kernighan,et al. The C Programming Language , 1978 .
[2] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[3] Maurice J. Bach. The Design of the UNIX Operating System , 1986 .
[4] Greg O'Shea,et al. On the Specification, Validation and Verification of Security in Access Control Systems , 1994, Comput. J..
[5] J. D. Tygar,et al. An Integrated Toolkit for Operating System Security , 1986 .
[6] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[7] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[8] Richard J. Lipton,et al. A Linear time algorithm for deciding security , 1976, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976).
[9] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.