共 44 条
[1]
Ware W.H., Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security, (1970)
[2]
Brinkley D.L., Schell R.R., Concepts and terminology for computer security, Information Security: An Integrated Collection of Essays, pp. 40-97, (1995)
[3]
Anderson J.P., Computer Security Technology Planning Study, (1972)
[4]
Myers P., Subversion: The Neglected Aspect of Computer Security, (1980)
[5]
The Easter Egg Archive, (2000)
[6]
Thompson K., Reflections on trusting trust, Commun ACM, 27, 8, pp. 761-763, (1984)
[7]
Karger P.A., Schell R.R., Multics Security Evolution: Vulnerability Analysis, ESD-TR-74-193, 2, (1974)
[8]
Final Evaluation Report: Boeing Space and Defense Group, (1991)
[9]
Information Systems Security Products and Service Catalog Supplement, (1992)
[10]
Final Evaluation Report of Gemini Computers, (1995)