Author:
Gianvecchio Steven,Wang Haining,Wijesekera Duminda,Jajodia Sushil
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Department of Defense, U.S.: Trusted computer system evaluation criteria (1985)
2. Lampson, B.W.: A note on the confinement problem. Communications of the ACM 16(10) (October 1973)
3. Lecture Notes in Computer Science;Z. Wang,2006
4. Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in internet traffic with active wardens. In: Proc. of the 2002 International Workshop on Information Hiding (October 2002)
5. Kang, M.H., Moskowitz, I.S.: A pump for rapid, reliable, secure communication. In: Proc. of ACM CCS 1993 (November 1993)
Cited by
75 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献