共 97 条
[61]
LynuxWorks Inc., 2012, TECHNICAL REPORT
[62]
A generic approach to the security of multi-threaded programs
[J].
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2001,
:126-142
[63]
Formal construction of the mathematically analyzed separation kernel
[J].
FIFTEENTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS,
2000,
:133-141
[65]
Re-engineering Xen internals for higher-assurance security
[J].
Inf Secur Tech Rep,
2008, 1 (17-24)
:17-24
[66]
McDermott J, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P419
[67]
McDermott John., 2008, P 6 ACM WORKSHOP FOR, P43, DOI DOI 10.1145/1456396.1456401
[68]
Murray Toby, 2012, Certified Programs and Proofs. Second International Conference (CPP 2012). Proceedings, P126, DOI 10.1007/978-3-642-35308-6_12
[69]
seL4: from General Purpose to a Proof of Information Flow Enforcement
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:415-429
[70]
National Security Agency, 2007, TECHNICAL REPORT