Composing secure systems that have emergent properties
暂无分享,去创建一个
[1] Aris Zakinthinos,et al. On the composition of security properties , 1997 .
[2] C. A. R. Hoare,et al. Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.
[3] E. Stewart Lee,et al. A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[4] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Colin O'Halloran,et al. A Calculus of Information Flow , 1990, ESORICS.
[6] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[7] Daryl McCullough,et al. Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.
[8] F. Javier Thayer,et al. Security and the Composition of Machines , 1988, CSFW.
[9] Daryl McCullough,et al. Noninterference and the composability of security properties , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.