A formal model for Unix setuid
暂无分享,去创建一个
[1] K. Thompson,et al. The UNIX time-sharing system , 1978 .
[2] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[3] Theodore M. P. Lee,et al. Using mandatory integrity to enforce 'commercial' security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[4] David Elliott Bell. Security policy modeling for the next-generation packet switch , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[5] Ken Thompson,et al. The UNIX Time-Sharing System (Reprint). , 1983 .
[6] Jerome H. Saltzer,et al. A hardware architecture for implementing protection rings , 1972, CACM.