Towards a theory of penetration-resistant systems and its applications
暂无分享,去创建一个
[1] D. Fishman,et al. A penetration analysis of the Michigan Terminal System , 1980, OPSR.
[2] Richard R. Linde,et al. Operating system penetration , 1975, AFIPS '75.
[3] Dennis Hollingworth,et al. Security Test and Evaluation Tools: An Approach to Operating System Security Analysis, , 1974 .
[4] Jim Carlstedt. Protection Errors in Operating Systems: Validation of Critical Conditions , 1976 .
[5] A. L. Wilkinson,et al. A penetration analysis of a Burroughs Large System , 1981, OPSR.
[6] William S. McPhee. Operating System Integrity in OS/VS2 , 1974, IBM Syst. J..
[7] Jonathan K. Millen. Kernel Isolation for the PDP-11/70 , 1982, 1982 IEEE Symposium on Security and Privacy.
[8] C. Richard Attanasio,et al. Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..
[9] Virgil D. Gligor,et al. On the Identification of Covert Storage Channels in Secure Systems , 1990, IEEE Trans. Software Eng..
[10] R. Stockton Gaines,et al. Some security principles and their application to computer security , 1978, OPSR.
[11] Virgil D. Gllgor. On denial-of-service in computer networks , 1986, 1986 IEEE Second International Conference on Data Engineering.
[12] Jingsha He,et al. Information-flow analysis for covert-channel identification in multilevel secure operating systems , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.