共 14 条
[2]
Fazio M, 2013, INT J COMPUT SCI ENG, V8, P227
[3]
Gopalan A., 2012, LNICST, V94, P148, DOI [10.1007/978-3-642- 30244-2_13, DOI 10.1007/978-3-642-30244-2_13]
[4]
Haldar V., 2004, USENIX VIRT MACH RES
[5]
Jaeger T., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P19
[8]
Sailer R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P223