共 13 条
- [1] [Anonymous], P 2005 NAT C DIG GOV
- [2] Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
- [3] Belief in information flow [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 31 - 45
- [4] Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
- [5] Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
- [6] Jouini M., 2012, International Journal of Cyber-Security and Digital Forensics IJCSDF, V1, P248
- [7] Landauer J., 1993, 1993 Computer Security Foundations Workshop VI Proceedings (Cat. No.93TH0561-1), P65, DOI 10.1109/CSFW.1993.246638
- [8] McIver A, 2003, MG COMP SCI, P441
- [9] McLean J., 1990, S P
- [10] Millen J., 1987, S P