Cut me some security
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Paul C. van Oorschot,et al. The developer is the enemy , 2009, NSPW '08.
[3] Hong Chen,et al. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems , 2009, NDSS.
[4] James P Anderson. Computer Security Technology Planning Study. Volume 2 , 1972 .
[5] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[6] Daniel F. Sterne,et al. Confining Root Programs with Domain and Type Enforcement , 1996, USENIX Security Symposium.
[7] Somesh Jha,et al. Automating Security Mediation Placement , 2010, ESOP.
[8] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[9] Xi Wang,et al. Improving application security with data flow assertions , 2009, SOSP '09.
[10] Andrew C. Myers,et al. Jif: java information flow , 1999 .
[11] Michael M. Swift,et al. Improving the granularity of access control for Windows 2000 , 2002, TSEC.
[12] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[13] Eamon F. Walsh,et al. Application of the Flask Architecture to the X Window System Server , 2007 .
[14] Li Gong,et al. Inside Java 2 Platform Security: Architecture, API Design, and Implementation , 1999 .
[15] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[17] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[18] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[19] Vladimir Gurvich,et al. Enumerating disjunctions and conjunctions of paths and cuts in reliability theory , 2007, Discret. Appl. Math..