共 21 条
[2]
Avarne S., 1988, DATA PROCESSING COMM, V12, P16
[3]
BARTON BF, 1988, COMPUTERS SECURITY, V3, P186
[4]
FISHER RP, 1984, INFORMATION SYSTEMS
[5]
Haga W.J., 1989, DATA PROCESSING COMM, P19
[6]
Hoffman Lance J., 1977, MODERN METHODS COMPU
[7]
Hsiao David K., 1979, COMPUTER SECURITY
[8]
Jobusch D. L., 1989, Computers & Security, V8, P675, DOI 10.1016/0167-4048(89)90006-0
[9]
Jobusch D. L., 1989, Computers & Security, V8, P587, DOI 10.1016/0167-4048(89)90051-5
[10]
Kurzban S., 1983, Security IFIP/Sec '83. IFIP First Security Conference, P15