Verifying a hardware security architecture
暂无分享,去创建一个
[1] Robin Milner,et al. Calculi for Synchrony and Asynchrony , 1983, Theor. Comput. Sci..
[2] Virgil D. Gligor. Analysis of the Hardware Verification of the Honeywell SCOMP , 1985, 1985 IEEE Symposium on Security and Privacy.
[3] Roger R. Schell,et al. Mechanism Sufficiency Validation by Assignment , 1981, 1981 IEEE Symposium on Security and Privacy.
[4] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[5] L. J. Fraim. Scomp: A Solution to the Multilevel Security Problem , 1983, Computer.
[6] John McLean,et al. A Formal Method for the Abstract Specification of Software , 1984, JACM.
[7] Robin Milner,et al. A Calculus of Communicating Systems , 1980, Lecture Notes in Computer Science.
[8] Hai-Ping Ko. Security properties of ring brackets , 1989, Proceedings of the Computer Security Foundations Workshop II,.
[9] William M. Farmer,et al. A partial functions version of Church's simple theory of types , 1990, Journal of Symbolic Logic.
[10] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.
[11] Alonzo Church,et al. A formulation of the simple theory of types , 1940, Journal of Symbolic Logic.
[12] Daryl McCullough,et al. Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.