共 6 条
[1]
商务安全策略及其形式分析研究[D]. 温红子.中国科学院研究生院(软件研究所). 2005
[4]
Design and verification of secure systems[J] . J. M. Rushby.ACM SIGOPS Operating Systems Review . 1981 (5)
[5]
Specification,Refinement,and Proof .2 J Woodcock,J Davies,Z Using. . 1996
[6]
A practical Alternative to Hierarchical Integrity Policies .2 W E Boebert,R Y Kain. TheNational Computer Security Conf . 1985