Selective and locally controlled transport of privileges
暂无分享,去创建一个
[1] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[2] Naftaly H. Minsky. Synergistic Authorization in Database Systems , 1981, VLDB.
[3] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[4] Abe Lockman,et al. Unidirectional Transport of Rights and Take–Grant Control , 1982, IEEE Transactions on Software Engineering.
[5] Richard J. Lipton,et al. A Linear time algorithm for deciding security , 1976, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976).
[6] Richard J. Lipton,et al. A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.
[7] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[8] Naftaly H. Minsky. Locality in software systems , 1983, POPL '83.
[9] N. Minsky,et al. The Darwin software-evolution environment , 1984, SDE 1.
[10] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[11] Alexander Borgida,et al. The Darwin software-evolution environment , 1984 .
[12] Ravinderpal Singh Sandhu,et al. Design and Analysis of Protection Schemes Based on the Send-Receive Transport Mechanism , 1983 .
[13] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).