共 27 条
- [1] AYDEMIR B, 2008, POPL 08
- [2] Expressive declassification policies and modular static enforcement [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 339 - +
- [3] BECKER MY, 2007, LECT NOTES COMPUTER, V4734
- [4] Bertot Yves, 2004, TEXT THEORET COMP S, DOI 10.1007/978-3-662-07964-5
- [5] Fuzzy multi-level security : An experiment on quantified risk-adaptive access control - Extended abstract [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 222 - +
- [6] Chong S., 2004, CCS 2004 P, P198
- [7] CRARY K, 1999, P 26 ACM SIGPLAN SIG, P262
- [8] DeLine Robert., 2001, Proceedings of the ACM SIGPLAN 2001 conference on Programming language design and implementation, P59, DOI DOI 10.1145/381694.378811
- [9] LATTICE MODEL OF SECURE INFORMATION-FLOW [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
- [10] ERLINGSSON U, 2004, THESIS CORNELL U