共 21 条
[11]
LANDWEHR CE, 1983, COMPUTER, V16, P86, DOI 10.1109/MC.1983.1654445
[12]
Menkus B., 1988, COMPUT SECUR, V7, P132, DOI [10.1016/0167-4048(88)90325-2, DOI 10.1016/0167-4048(88)90325-2]
[13]
Paans R., 1987, Computers & Security, V6, P403, DOI 10.1016/0167-4048(87)90013-7
[14]
PFLEEGER CP, 1989, SECURITY COMPUTING
[15]
Porter S. N., 1982, Computers & Security, V1, P54, DOI 10.1016/0167-4048(82)90025-6
[16]
Smith S. L., 1987, Computers & Security, V6, P464, DOI 10.1016/0167-4048(87)90027-7
[17]
SPENDER JC, COMPUTERS SECURITY, V6, P385
[18]
INFORMATION-SYSTEMS SECURITY AND PRIVACY
[J].
COMMUNICATIONS OF THE ACM,
1984, 27 (04)
:315-321
[19]
Wood C. C., 1983, Computers & Security, V2, P5, DOI 10.1016/0167-4048(83)90028-7
[20]
Zviran M., 1990, Computers & Security, V9, DOI 10.1016/0167-4048(90)90115-A