Logical Resolving for Security Evaluation
暂无分享,去创建一个
[1] Karl N. Levitt,et al. Security Policy Specification Using a Graphical Approach , 1998, ArXiv.
[2] John McLean,et al. The algebra of security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[3] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[5] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[6] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[7] John McLean,et al. Reasoning About Security Models , 1987, 1987 IEEE Symposium on Security and Privacy.
[8] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[9] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[10] Ivan Bratko,et al. Prolog Programming for Artificial Intelligence , 1986 .