共 12 条
[1]
BELL D, 1975, MTR2997 MITRE CORP T
[2]
Boebert W. E., 1985, 8 NAT COMP SEC C GAI, P18
[3]
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[4]
Goguen J. A., 1984, Proceedings of the 1984 Symposium on Security and Privacy, P75
[5]
GOOD D, 1978, ICSCACMP10 U TEX AUS
[6]
GOOD DI, 1984, USING GYPSY METHODOL
[7]
KEMMERER R, 1986, 1986 P S SEC PRIV IE, P14
[8]
MCHUGH J, 1985, 8TH P NAT COMP SEC C, P133
[9]
RUSHBY J, 1981, VERIFICATION SECURE
[10]
RUSHBY J, MATH F MLS TOOL REVI