共 17 条
- [1] Amtoft T, 2010, LECT NOTES COMPUT SC, V6012, P43, DOI 10.1007/978-3-642-11957-6_4
- [2] Annichini A, 2001, LECT NOTES COMPUT SC, V2102, P368
- [3] [Anonymous], 2006, USA, DOI DOI 10.1145/1180405.1180417
- [4] [Anonymous], 1999, P 26 ACM SIGPLAN SIG
- [5] Bardin S, 2003, LECT NOTES COMPUT SC, V2725, P118
- [6] Bonelli E, 2006, LECT NOTES COMPUT SC, V3956, P37
- [7] Lenient array operations for practical secure information flow [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 115 - 124
- [8] LATTICE MODEL OF SECURE INFORMATION-FLOW [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
- [9] CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW [J]. COMMUNICATIONS OF THE ACM, 1977, 20 (07) : 504 - 513
- [10] Genaim S, 2005, LECT NOTES COMPUT SC, V3385, P346