Approaches to handling "Trojan Horse" threats
暂无分享,去创建一个
[1] R. Bernhard. Breaching system security , 1982, IEEE Spectrum.
[2] Peter J. Denning,et al. Data Security , 1979, CSUR.
[3] Lance J. Hoffman,et al. Modern methods for computer security and privacy , 1973 .
[4] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[5] P. A. Karger. NON-DISCRETIONARY ACCESS CONTROL FOR DECENTRALIZED COMPUTING SYSTEMS , 1977 .
[6] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[7] Niv Ahituv,et al. Verifying the authentication of an information system user , 1987, Comput. Secur..