Controlled information sharing in NATO operations
暂无分享,去创建一个
[1] Jonathan Jacky,et al. The Way of Z: Practical Programming with Formal Methods , 1996 .
[2] Jean-Raymond Abrial,et al. Modeling in event-b - system and software engineering by Jean-Raymond Abrial , 2010, SOEN.
[3] Cynthia E. Irvine,et al. MYSEA: the monterey security architecture , 2009, STC '09.
[4] Mike Maschino,et al. Towards achieving cross domain information sharing in a SOA-enabled environment using MILS and MLS technologies , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[5] J.G.R. Sathiaseelan,et al. Multi-Level Secure Architecture for distributed integrated Web services , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[6] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[7] Jacob C. N. Schuldt,et al. Wildcarded Identity-Based Encryption , 2010, Journal of Cryptology.
[8] Sander Oudkerk,et al. Protected core networking: an architectural approach to secure and flexible communications , 2008, IEEE Communications Magazine.
[9] Peter H. Feiler,et al. Building Secure Systems using Model-Based Engineering and Architectural Models , 2008 .
[10] Daniel Jackson,et al. Software Abstractions - Logic, Language, and Analysis , 2006 .
[11] Konrad Wrona,et al. Designing medium assurance XML-labelling guards for NATO , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[12] François Pessaux,et al. Trusted Software within Focal , 2008 .
[13] Cynthia E. Irvine,et al. A cloud-oriented cross-domain security architecture , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.