共 12 条
[1]
Bishop M, 1996, COMPUT SYST, V9, P131
[2]
Chen H, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, P171
[3]
CHEN H, 2004, P 11 ANN NETW DISTR, P171
[4]
Dean D, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P195
[5]
Hardy N., 1988, Operating Systems Review, V22, P36, DOI 10.1145/54289.871709
[6]
Ko C, 2002, P IEEE S SECUR PRIV, P177, DOI 10.1109/SECPRI.2002.1004370
[7]
Secure applications need flexible operating systems
[J].
SIXTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS,
1997,
:56-61
[9]
SCHMUCK F, 1991, P 13 ACM S OP SYST P, P239
[10]
SCHWARZ B, 2005, UCBCSD051384