Author:
Shahriari Hamid Reza,Jalili Rasool
Subject
Law,General Computer Science
Reference36 articles.
1. Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In: Proceedings of nineth ACM conference on computer and communications security, Washington, DC; November 2002.
2. Bishop M. Hierarchical take-grant protection systems. In: Proceedings of 8th symposium on operating systems principals; December 1981. p. 107–23.
3. Bishop M. Practical Take-Grant systems: do they exist? Ph.D. thesis, Department of Computer Sciences, Purdue University, West Lafayette, IN 47097; May 1984.
4. Conspiracy and information flow in the Take-Grant protection model;Bishop;Journal of Computer Security,1996
5. A critical analysis of vulnerability taxonomies;Bishop,1996
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献