Subject
Hardware and Architecture,Information Systems,Software
Reference48 articles.
1. Agat, J., 2000. Transforming out timing leaks. In: Proceedings of the 27th ACM Symposium on Principles of Programming Languages, pp. 40–53
2. Role-based authorization constraints specification;Ahn;ACM Transactions on Information and System Security,2000
3. Bell, D.E., LaPadula, L.J., 1976. Secure computer systems: unified exposition and multics interpretation. Technique Report, Mitre Corporation, In: http://csrc.nist.gov/publications/history/bell76.pdf
4. exception-based information flow control in object-oriented systems;Bertino;ACM Transactions on Information and System Security,1998
5. Object-Oriented Analysis and Design with Application;Booch,1994
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献