Secure Computer System: Unified Exposition and Multics Interpretation
暂无分享,去创建一个
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] N. Johnson. The MITRE corporation , 1961, ACM National Meeting.
[3] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[4] L. Smith. Architectures for Secure Computing Systems , 1975 .
[5] David K. Hsiao,et al. A Model for Data Secure Systems. Part III. A Deadlock Based Protection Mechanism , 1974 .
[6] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[7] D. F. Stork. Downgrading in a Secure Multilevel Computer System: The Formulary Concept , 1975 .
[8] Edwin John Mccauley,et al. A model for data secure systems. , 1975 .
[9] Elliott I. Organick,et al. The Multics system , 1972 .
[10] Gerald J. Popek,et al. Encapsulation: an approach to operating system security , 1974, ACM '74.
[11] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).