Author:
Cooper David,Stepney Susan
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Rosalind Barden, Susan Stepney, and David Cooper. Z in Practice. BCS Practitioners Series. Prentice Hall, 1994.
2. David E. Bell and Len J. La Padula. Secure computer system: unified exposition and MULTICS. Report ESD-TR-75-306, The MITRE Corporation, March 1976.
3. D. E. Bell. Concerning “modelling” of computer security. In Proceedings 1988 IEEE Symposium on Security and Privacy, pages 8–13. IEEE Computer Society Press, April 1988.
4. J. A. Goguen and J. Meseguer. Unwinding and inference control. In Proceedings 1984 IEEE Symposium on Security and Privacy, pages 75–86. IEEE Computer Society, 1984.
5. Dieter Gollman. Computer Security. John Wiley, 1998.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Patterns to Guide Practical Refactoring: Examples Targetting Promotion in Z;ZB 2003: Formal Specification and Development in Z and B;2003
2. Formal Methods for Industrial Products;ZB 2000: Formal Specification and Development in Z and B;2000