On the security of open source software
暂无分享,去创建一个
[1] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[2] Charles P. Pfleeger,et al. Security in computing , 1988 .
[3] G. T. Gangemi,et al. Computer Security Basics , 2006 .
[4] Chris DiBona,et al. Open Sources: Voices from the Open Source Revolution , 1999 .
[5] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[6] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[7] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[8] Christian Payne. The Role of the Development Process in Operating System Security , 2000, ISW.
[9] Simson L. Garfinkel,et al. Practical UNIX and Internet Security , 1996 .
[10] Christian Payne. Security through design as a paradigm for systems development , 1999 .
[11] Tatu Ylonen,et al. SSH: secure login connections over the internet , 1996 .