A Practical Tool for Developing Trusted Applications
暂无分享,去创建一个
[1] Prateek Mishra,et al. Type Inference with Subtypes , 1990, Theor. Comput. Sci..
[2] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[3] Cynthia E. Irvine. A multilevel file system for high assurance , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[4] H. Brix,et al. Formal construction of provably secure systems with Cartesiana , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[6] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[7] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[8] M. Gordon. HOL: A Proof Generating System for Higher-Order Logic , 1988 .
[9] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[10] Geoffrey Smith. Polymorphic Type Inference for Languages with Overloading and Subtyping , 1991 .
[11] Dorothy E. Denning. Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.