Concerning 'modeling' of computer security
暂无分享,去创建一个
[1] M. Newman,et al. Topics in Algebra , 1978 .
[2] Richard A. Kemmerer,et al. Specification and verification of the UCLA Unix security kernel , 1979, CACM.
[3] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[4] G. Birkhoff,et al. A survey of modern algebra , 1942 .
[5] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[6] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[7] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[8] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[9] Gerald J. Popek,et al. A model for verification of data security in operating systems , 1978, CACM.
[10] D. Elliott Bell. Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .
[11] Lance Joel Hoffman,et al. The formulary model for access control and privacy in computer systems , 2018 .
[12] Carl E. Landwehr,et al. A Formal Statement of the MMS Security Model , 1984, 1984 IEEE Symposium on Security and Privacy.
[13] John McLean,et al. Reasoning About Security Models , 1987, 1987 IEEE Symposium on Security and Privacy.
[14] R. Leighton,et al. Feynman Lectures on Physics , 1971 .
[15] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[16] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[17] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[18] Ernest Nagel,et al. Gödel's Proof , 1958 .