Denial of Service: A Perspective
暂无分享,去创建一个
[1] Virgil D. Gligor,et al. A Note on the Denial-of-Service Problem , 1983, 1983 IEEE Symposium on Security and Privacy.
[2] J. T. Haigh,et al. Assured Service Concepts and Models. Volume 3. Availability in Distributed MLS Systems , 1992 .
[3] Wei-Ming Hu,et al. Lattice scheduling and covert channels , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[5] Ali Mili,et al. Introduction to Program Fault Tolerance , 1990 .
[6] Virgil D. Gligor,et al. A Specification and Verification Method for Preventing Denial of Service , 1990, IEEE Trans. Software Eng..
[7] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[8] Bev Littlewood. How to Measure Software Reliability and How Not To , 1979, IEEE Transactions on Reliability.
[9] Azer Bestavros,et al. Specification and verification of real-time embedded systems using time-constrained reactive automata , 1991, [1991] Proceedings Twelfth Real-Time Systems Symposium.
[10] John M. Boone,et al. Integrity in Automated Information Systems , 1991 .
[11] Nancy G. Leveson. Verification of Safety , 1983 .
[12] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[13] Ravi S. Sandhu. Expressive Power of the Schematic Protection Model , 1992, J. Comput. Secur..
[14] Jonathan K. Millen,et al. A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] John E. Dobson,et al. Information and Denial of Service , 1991, Database Security.