Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Clark, D.D., Wilson, D.R.A.: Comparison of Commercial and Military Computer Security Policies. In: IEEE Symposium of Security and Privacy, pp. 184–194 (1987)
2. Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Foundations. MITRE Technical Report 2547, vol. I (1973)
3. Schneider, B.: Secrets and Lies: digital security in a networked world. John Wiley & Sons, Chichester (2000)
4. Nicol, D., Sanders, W., Trivedi, K.: Model-Based Evaluation: From Dependability to Security. IEEE Transactions on Dependable and Secure Computing 1(1), 48–65 (2004)
5. Coase, R.H.: The Nature of the Firm. Economica 4, 386–405 (1937)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献