Vulnerabilities Detection in the Configurations of MS Windows Operating System
暂无分享,去创建一个
[1] Jan Jürjens,et al. Automated Verification of UMLsec Models for Security Requirements , 2004, UML.
[2] C. A. R. Hoare,et al. Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.
[3] J. Doug Tygar,et al. Specifying and Checking UNIX Security Constraints , 1994, Comput. Syst..
[4] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[5] Maxim O. Kalinin,et al. Logical Resolving for Security Evaluation , 2003, MMM-ACNS.
[6] Jean-Marc Jézéquel,et al. ≪UML≫ 2002 — The Unified Modeling Language , 2002, Lecture Notes in Computer Science.
[7] Jan Jürjens,et al. UMLsec: Extending UML for Secure Systems Development , 2002, UML.
[8] J. Doug Tygar,et al. Miró: Visual Specification of Security , 1990, IEEE Trans. Software Eng..