共 12 条
[1]
Users are not the enemy. Adams,A,Sasse,MA. Communications of the ACM . 1999
[2]
The Design and Implementation of a Transparent Cryptographic File System for UNIX. Giuseppe Cattaneo,,Luigi Catuogno,Aniello Del Sorbo,Pino Persiano. proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference . 2001
[3]
Kerberos: An Authentication Service for Computer Networks. Neuman BC,Tso T. IEEE Communications Magazine . 1994
[4]
Password security: a case history. Morris R,Thompson K. Communications of the ACM . 1979
[5]
BUS Hound 5.0:.software product for capturing device data transfers and protocol. http://www.perisoft.net/bushound/index.htm .
[6]
The Professional HEX Editor for Files and Disks. FLEXHEX. http://www.flexhex.com/ .
[7]
EnCase:A Case Study in Computer-Forensic Technology. LEE GARBER. Computer Manazine,IEEE . 2001
[8]
Enabling trusted software integrity. DARKO KIROVSKI,M DRINIC,et al. ACM SIGPLAN Notices . 2002
[9]
A pact with the devil. MIKE BOND,GEORGE DANEZIS. Proceedings ofthe2006workshop on New securityparadigms . 2006
[10]
A cryptographic file system for UNIX. MATT BLAZE. Conf.on Computer and Communications SecurityProceedings ofACM . 1993