Integrity Considerations for Secure Computer Systems
暂无分享,去创建一个
[1] Gerald J. Popek,et al. Preliminary Notes on the Design of Secure Military Computer Systems. , 1973 .
[2] Jonathan K. Millen,et al. Security Kernel validation in practice , 1976, CACM.
[3] D. E. Bell,et al. A Software Validation Technique for Certification: The Methodology , 1975 .
[4] Jeffrey D. Ullman,et al. On protection in operating systems , 1975, SOSP.
[5] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[6] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[7] Elliott I. Organick,et al. The multics system: an examination of its structure , 1972 .
[8] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[9] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[10] K. G. Walter,et al. Primitive Models for Computer Security , 1974 .