Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: On protection in operating systems. In: SOSP 1975: Proceedings of the Fifth ACM Symposium on Operating Systems Principles, pp. 14–24 (1975)
2. Denning, D.: Cryptography and Data Security. Addison Wesley (1982)
3. Lampson, B.W.: Protection. In: Proc. Fifth Princeton Symposium on Information Sciences and Systems (1971)
4. Jones, A.K., Lipton, R.J., Snyder, L.: A linear time algorithm for deciding security. In: Symposium on Foundations of Computer Science, pp. 33–41 (1976)
5. Bishop, M.: Theft of information in the take-grant protection model. In: CSFW, pp. 194–218 (1988)