Author:
Aziz Benjamin,Foley Simon N.,Herbert John,Swart Garret
Publisher
Kluwer Academic Publishers
Reference24 articles.
1. Eric Anderson, Michael Hobbs, Kimberly Keeton, Susan Spence, Mustafa Uysal, and Alistair C. Veitch. Hippodrome: Running circles around storage administration. In Darrell D. E. Long, editor, Proceedings of the FAST’02 Conference on File and Storage Technologies, pages 175–188, Monterey, California, USA, January 2002. USENIX.
2. D.E. Bell and L.J. La Padula. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, Mitre Corporation, July 1975.
3. Stefano Bistarelli, Simon N. Foley, and Barry O’Sullivan. Modelling and detecting the cascade vulnerability problem using soft constraints. In Proceedings of the ACM Symposium on Applied Computing, Nicosia, Cyprus, March 2004. ACM Press.
4. D.F.C. Brewer and M.J. Nash. The Chinese wall security policy. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 206–214, Oakland, California, USA, May 1989. IEEE Computer Society Press.
5. Inc. Distributed Management Task Force. Web-based enterprise management (wbem) initiative. http://www.dmtf.org/standards/wbem .
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献