Towards a model of storage jamming
暂无分享,去创建一个
[1] R. Gerth,et al. Rooting UNITY , 1989, IWSSD '89.
[2] D. Goldschlag,et al. Mechanically verifying concurrent programs , 1992 .
[3] R. Sandhu. TERMINOLOGY, CRITERIA AND SYSTEM ARCHITECTURES FOR DATA INTEGRITY , 1989 .
[4] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[5] Ravi S. Sandhu,et al. Separation of Duties in Computerized Information Systems , 1990, DBSec.
[6] Simon R. Wiseman,et al. The Control of Integrity in Databases , 1990, DBSec.
[7] Carlo Ghezzi,et al. Proceedings of the 6th international workshop on Software specification and design , 1991 .
[8] John P. McDermott,et al. Storage Jamming , 1995, DBSec.
[9] R. R. Jueneman. Integrity controls for military and commercial applications , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[10] Dan Thomsen,et al. A comparison of type enforcement and Unix setuid implementation of well-formed transactions , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[11] Z. G. Ruthberg,et al. Report of the Invitational Workshop on Data Integrity | NIST , 1989 .
[12] K. Mani Chandy,et al. Parallel program design - a foundation , 1988 .
[13] Jan K. Pachl. A Simple Proof of a Completeness Result for leads-to in the UNITY Logic , 1992, Inf. Process. Lett..
[14] Andrew Wood,et al. The trusted path between SMITE and the user , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.