共 33 条
[21]
Hiltunen M. A., 1998, IEE Proceedings-Software, V145, P180, DOI 10.1049/ip-sen:19982298
[22]
HOUSLEY R, 1999, 1949 RFC
[23]
A logical language for expressing authorizations
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:31-42
[24]
LEIGHTON T, 1994, P CRYPTO 93, P456
[25]
LIU X, 1999, P 17 ACM SOSP CHARL, V33, P80
[26]
McDaniel P, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, P55, DOI 10.1109/DISCEX.2001.932159
[27]
McDaniel P, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P99
[28]
MCDANIEL P, 2001, THESIS U MICHIGAN AN
[29]
Ryutov T., 2000, P DARPA INF SURV C E, P172
[30]
Schaefer T. J., 1978, C RECORD 10 ANN ACM, P216, DOI DOI 10.1145/800133.804350