A Security Enhancement Architecture for COTS Operating System
暂无分享,去创建一个
[1] Zhen Ji,et al. Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.
[2] Timothy Fraser,et al. LOMAC: Low Water-Mark integrity protection for COTS environments , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Matthew Scott Rimer. The secure file system under Windows NT , 1999 .
[4] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[5] Steven B. Lipner,et al. Trusted Computer System Evaluation Criteria ( Orange Book ) December , 2001 .
[6] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[7] Kazuyuki Aihara,et al. Dynamical Characteristics of Discretized Chaotic Permutations , 2002, Int. J. Bifurc. Chaos.
[8] L. Kocarev,et al. Pseudorandom bits generated by chaotic maps , 2003 .
[9] Slawomir T. Fryska,et al. Computer dynamics and shadowing of chaotic orbits , 1992 .
[10] T. Mitchem,et al. Using kernel hypervisors to secure applications , 1997, Proceedings 13th Annual Computer Security Applications Conference.