共 97 条
- [61] LynuxWorks Inc., 2012, TECHNICAL REPORT
- [62] A generic approach to the security of multi-threaded programs [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 126 - 142
- [63] Formal construction of the mathematically analyzed separation kernel [J]. FIFTEENTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, 2000, : 133 - 141
- [64] Creating high confidence in a separation kernel [J]. Automated Software Engineering, 2002, 9 (3) : 263 - 284
- [65] Re-engineering Xen internals for higher-assurance security [J]. Inf Secur Tech Rep, 2008, 1 (17-24): : 17 - 24
- [66] McDermott J, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P419
- [67] McDermott John., 2008, P 6 ACM WORKSHOP FOR, P43, DOI DOI 10.1145/1456396.1456401
- [68] Murray Toby, 2012, Certified Programs and Proofs. Second International Conference (CPP 2012). Proceedings, P126, DOI 10.1007/978-3-642-35308-6_12
- [69] seL4: from General Purpose to a Proof of Information Flow Enforcement [J]. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 415 - 429
- [70] National Security Agency, 2007, TECHNICAL REPORT