共 14 条
- [1] ABADI M, 2003, P 11 NETW DISTR SYST
- [2] Banerjee A., 2004, LNCS, V3362, P27
- [3] Cong Sun, 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in conjunction with the UIC 2009 and ATC 2009 Conferences, P586, DOI 10.1109/UIC-ATC.2009.44
- [4] Gong L, 1997, PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS, P103
- [5] He Y., 2009, MULTICORE ENABLING B
- [6] Jha S, 2006, LECT NOTES COMPUT SC, V3920, P1
- [7] KIDD N, 2008, WALI A C LIB WEIGHTE
- [8] Lal A, 2005, LECT NOTES COMPUT SC, V3576, P434
- [9] Lind-Nielsen J., 2004, DUBBY BINARY DECISIO
- [10] Beyond stack inspection: A unified access-control and information-flow security model [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 149 - +