The enforcement of security policies for computation
暂无分享,去创建一个
[1] Michael D. Schroeder,et al. Cooperation of mutually suspicious subsystems in a computer utility , 1972 .
[2] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[3] Elliott I. Organick,et al. The multics system: an examination of its structure , 1972 .
[4] William A. Wulf,et al. HYDRA: The Kernel of a Multiprocessor Operating System , 1974, Commun. ACM.
[5] Gerald J. Popek,et al. Verifiable secure operating system software , 1974, AFIPS '74.
[6] David Lorge Parnas,et al. A technique for software module specification with examples , 1972, CACM.
[7] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[8] Lawrence Robinson,et al. A Provably Secure Operating System. , 1975 .
[9] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[10] Anita K. Jones,et al. Protection in programmed systems. , 1973 .
[11] Leo Joseph Rotenberg,et al. Making computers keep secrets , 1973 .
[12] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).