Applications for multilevel secure operating systems
暂无分享,去创建一个
[1] Marvin Schaefer,et al. Secure Data Management System. , 1975 .
[2] D. E. Bell,et al. A Software Validation Technique for Certification: The Methodology , 1975 .
[3] M. A. Padlipsky,et al. KSOS—Computer network applications , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] B N Wagner. Implementation of a Secure Data Management System for the Secure UNIX Operating System , 1978 .
[5] J P L Woodward,et al. A Kernel-Based Secure Unix Design. , 1979 .
[6] G. Rolfe,et al. Detail Specification for the Security Protection Module (SPM) , 1976 .
[7] Stanley R. Ames,et al. Design of a message processing system for a multilevel secure environment , 1978, AFIPS National Computer Conference.
[8] K. G. Walter,et al. Primitive Models for Computer Security , 1974 .
[9] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[10] T. A. BERSON,et al. KSOS—Development methodology for a secure operating system , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[11] Gillian Kirkby,et al. On Specifying the Functional Design for a Protected DMS Tool , 1977 .
[12] Jonathan K. Millen,et al. Security Kernel validation in practice , 1976, CACM.