A Formal Integrity Framework with Application to a Secure Information ATM (SIATM)
暂无分享,去创建一个
[1] Sihan Qing,et al. A Practical Alternative to Domain and Type Enforcement Integrity Formal Models , 2006, Inscrypt.
[2] Liang Hong-liang,et al. Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy , 2010 .
[3] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[4] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[5] Jun Zhang,et al. Research of BLP and Biba dynamic union model based on check domain , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[6] Hsiang-Chuan Liu. A completed partial order of ordered semi-vector space of intuitionistic fuzzy values , 2010 .
[7] Steven B. Lipner,et al. Non-Discretionery Controls for Commercial Applications , 1982, 1982 IEEE Symposium on Security and Privacy.
[8] Tao Wang,et al. An Integrity Control Model for Operating System , 2009, 2009 International Conference on Management and Service Science.
[9] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Dengguo Feng,et al. BIFI: Architectural Support for Information Flow Integrity Measurement , 2008, 2008 International Conference on Computer Science and Software Engineering.
[12] G. Vargo. The Atomic Chef???and Other True Tales of Design, Error, and Human Technology , 2006 .
[13] Régine Laleau,et al. Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment , 2004, CAiSE.
[14] Yeping He,et al. A formal model for integrity protection based on DTE technique , 2006, Science in China Series F: Information Sciences.
[15] Mingxi Zhang,et al. Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness , 2009, 2009 International Conference on Computational Intelligence and Security.
[16] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[17] Anneli Folkesson,et al. Secure Computer Systems , 2013 .
[18] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[19] Zhou-Yi Zhou,et al. Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy: Hybrid Mandatory Integrity Model Composed of Biba and Clark-Wilson Policy , 2010 .