Security Policies and Security Models
暂无分享,去创建一个
We assune that the reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts. This need is particularly acute for systems having computers as significant components.
[1] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[2] Edsger W. Dijkstra,et al. On a political pamphlet from the middle ages , 1978, SOEN.
[3] Richard J. Feiertag. A Technique for Proving Specifications are Multilevel Secure , 1980 .