Subject
General Computer Science,Theoretical Computer Science
Reference17 articles.
1. Conspiracy and information flow in the take-grant protection model;Bishop;Journal of Computer Security,1996
2. M. Bishop and L. Snyder. The transfer of information and authority in a protection system. In Proc. 7th SOSP, pages 45–54, New York, NY, USA, 1979. ACM Press
3. Secure microkernels, state monads and scalable refinement;Cock,2008
4. P. Derrin, K. Elphinstone, G. Klein, D. Cock, and M.M.T. Chakravarty. Running the manual: An approach to high-assurance microkernel development. In Proc. ACM SIGPLAN Haskell WS, Portland, OR, USA, Sept. 2006
5. D. Elkaduwe. A Principled Approach To Kernel Memory Management. PhD thesis, School Comp. Sci. & Engin., University NSW, Sydney 2052, Australia, Aug. 2008
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Requirements are the New Code;2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC);2016-06