1 |
Andrews, Peter. System Description: TPS: A Theorem Proving System for Type Theory, 2000
|
2 |
White, G., Fisch, E., Pooch, U., 'Government- based security standards,' Auerbach Publications Inf. Syst. Secur. (USA), 6권, 3호, pp9-19, 2003
|
3 |
박 태규, '보안 리눅스(Secure Lunux) 연구개발 동향,' 情報保護學會誌 pp37-48, 2003
|
4 |
한국정보보호진흥원, 국가기관용 등급기반 접근통제보호 프로파일, 2004. 2. 26
|
5 |
http://pvs.csl.sri.com/introduction.shtml
|
6 |
티에스온넷(주), RedOwl SecuOS Administration Guide, 2004
|
7 |
김 의탁 '접근통제 기술 동향,' 通信情報保學會 8권, 4호, pp77-96, 1998
|
8 |
Bell. D. and LaPadula., 'Secure Computer System : Mathematical Foundations and Model,' MITRE Report MTR 2547, v2, Nov. 1973
|