SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS
暂无分享,去创建一个
[1] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[2] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[3] William L. Maxwell,et al. Selective security capabilities in ASAP: a file management system , 1972, AFIPS '72 (Spring).
[4] Theodore D. Friedman,et al. The Authorization Problem in Shared Files , 1970, IBM Syst. J..
[5] M. Mesarovic,et al. Theory of Hierarchical, Multilevel, Systems , 1970 .
[6] Lance J. Hoffman,et al. Computers and Privacy: A Survey , 1969, CSUR.
[7] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[8] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[9] R. M. Graham. Protection in an information processing utility , 1968, CACM.