Security Considerations for Personal Computers
暂无分享,去创建一个
[1] K. S. Shankar,et al. Special Feature The Total Computer Security Problem: an Oveview , 1977, Computer.
[2] Jonathan K. Millen,et al. Security Kernel validation in practice , 1976, CACM.
[3] Samantha Fordyce,et al. Computer security: A current assessment , 1982, Comput. Secur..
[4] Stephen M. Matyas. Digital Signatures - An Overview , 1979, Comput. Networks.
[5] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[6] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[7] ROBERT P. CAMPBELL,et al. A modular approach to computer security risk management , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[8] Peter J. Denning. A Scientist's View of Government Control Over Scientific Publication , 1982, IEEE Technology and Society Magazine.
[9] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[10] Peter J. Denning,et al. Data Security , 1979, CSUR.