Idea: Trusted Emergency Management
暂无分享,去创建一个
Terry V. Benzel | Cynthia E. Irvine | Timothy E. Levin | Thuy D. Nguyen | Ganesha Bhaskara | Paul C. Clark | C. Irvine | T. Levin | P. Clark | G. Bhaskara
[1] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Cynthia E. Irvine,et al. SecureCore Security Architecture: Authority Mode and Emergency Management , 2007 .
[3] Cynthia E. Irvine,et al. SecureCore software architecture trusted path application (TPA) requirements , 2007 .
[4] Ross J. Anderson,et al. A security policy model for clinical information systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[5] Ruby B. Lee,et al. Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.
[6] Terry V. Benzel,et al. Trusted emergency management , 2009 .
[7] Cynthia E. Irvine,et al. A security architecture for transient trust , 2008, CSAW '08.
[8] Cynthia E. Irvine,et al. Analysis of three multilevel security architectures , 2007, CSAW '07.
[9] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.