共 13 条
[1]
[Anonymous], P 2005 NAT C DIG GOV
[2]
Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
[3]
Belief in information flow
[J].
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2005,
:31-45
[4]
Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
[5]
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[6]
Jouini M., 2012, International Journal of Cyber-Security and Digital Forensics IJCSDF, V1, P248
[7]
Landauer J., 1993, 1993 Computer Security Foundations Workshop VI Proceedings (Cat. No.93TH0561-1), P65, DOI 10.1109/CSFW.1993.246638
[8]
McIver A, 2003, MG COMP SCI, P441
[9]
McLean J., 1990, S P
[10]
Millen J., 1987, S P