Author:
Bossi Annalisa,Focardi Riccardo,Piazza Carla,Rossi Sabina
Subject
Computer Networks and Communications,Software
Reference54 articles.
1. Bisimulation and unwinding for verifying possibilistic security properties;Bossi,2003
2. Bell DE, Padula LJJ, Secure Computer Systems: Unified Exposition and Multics Interpretation, ESD-TR-75-306, MITRE MTR-2997.
3. Tsai CR, Gligor VD, Chandersekaran CS. On the identification of covert storage channels in secure systems. IEEE Transactions on Software Engineering 1990; 569–80.
4. Millen JK. Finite-state noiseless covert channels., In: Proceedings of the Computer Security Foundations Workshop II, the MITRE Corporation. Silver Spring, MD: IEEE Computer Society Press, 1989. p. 81–6.
5. Goguen JA, Meseguer J. Security policies and security models. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP’82). Silver Spring, MD: IEEE Computer Society Press; 1982. p. 11–20.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献