Understanding Android Security
暂无分享,去创建一个
[1] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[2] Ivan Krstic,et al. Bitfrost: the one laptop per child security model , 2007, SOUPS '07.
[3] William Enck,et al. Mitigating Android Software Misuse Before It Happens , 2008 .
[4] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[5] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[6] Daniel F. Sterne,et al. Practical Domain and Type Enforcement for UNIX , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[7] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.