共 11 条
[1]
Some weaknesses of the TCB model
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:3-5
[2]
BORHAM R, 2003, P 19 ACM S OP SYST P, P164
[3]
MICHAEL H, 2006, TCB SIZE USING UNTRU
[4]
*MICR, 2006, MOD NEXT GEN SEC COM
[5]
PAUL A, 2005, COMP SEC APPL C 21 A, P267
[6]
PAUL A, 1990, P IEEE S RES SEC PRI, P2
[7]
REFINER S, 2005, MAC BASED SECURITY A
[8]
REFINER S, 2004, P 13 US SEC S SAN DI, P223
[9]
RICH U, 2005, COMPUTER, V38, P48
[10]
TAL G, 2003, SOSP03, P193