Abstract
Dramatically more trustworthy cyber security is a choice.
Publisher
Association for Computing Machinery (ACM)
Reference8 articles.
1. Security Kernel Design and Implementation: An Introduction
2. Using Proven Reference Monitor Patterns for Security Evaluation
3. Higgins K.J. IBM: The security business 'has no future.' Information Week Dark Reading (4/10/2008); http://www.darkreading.com/ibm-the-security-business-has-no-future/d/d-id/1129423 Higgins K.J. IBM: The security business 'has no future.' Information Week Dark Reading (4/10/2008); http://www.darkreading.com/ibm-the-security-business-has-no-future/d/d-id/1129423
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献