The foundations of a provably secure operating system (PSOS)
暂无分享,去创建一个
[1] Peter G. Neumann,et al. Computer system - Security evaluation , 1899, AFIPS National Computer Conference.
[2] Lawrence Robinson,et al. SPECIAL Reference Manual. , 1977 .
[3] E. J. McCauley,et al. KSOS - The design of a secure operating system , 1899 .
[4] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[5] Butler W. Lampson,et al. Reflections on an operating system design , 1976, CACM.
[6] William A. Wulf,et al. HYDRA , 1974, Commun. ACM.
[7] Theodore A. Linden. Operating System Structures to Support Security and Reliable Software , 1976, CSUR.
[8] Lawrence Robinson,et al. Proof techniques for hierarchically structured programs , 1977, CACM.
[9] Gerald J. Popek,et al. A model for verification of data security in operating systems , 1978, CACM.
[10] E. J. McCAULEY,et al. KSOS—The design of a secure operating system* , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] T. A. BERSON,et al. KSOS—Development methodology for a secure operating system , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[12] Jonathan K. Millen,et al. Security Kernel validation in practice , 1976, CACM.
[13] Roger M. Needham,et al. Protection systems and protection implementations , 1899, AFIPS '72 (Fall, part I).
[14] Lawrence Robinson,et al. Proving multilevel security of a system design , 1977, SOSP '77.
[15] T. A. Berson,et al. KSOS - Development methodology for a secure operating system , 1899 .
[16] Richard C. Holt,et al. Project SUE as a learning experience , 1972, AFIPS '72 (Fall, part I).