1 |
/
[
Jones,A.
] /
Protection Mechanism Models: Their Usefulness
|
2 |
/
[
Matt Bishop
] /
Computer Security: Art and Science
|
3 |
/
[
홍기융;은유진;김재명;이규호
] /
Secure OS기반의 지능형 다단계 정보보호시스템
|
4 |
/
[] /
전산망정보보호-접근통제기술
|
5 |
Department of Defense Trusted Computer System Evaluation Criteria
/
[
NCSC
] /
DoD 5200.28-STD
|
6 |
/
[
Charles P. Pfleeger
] /
Security in Computing
|
7 |
/
[
Morrie Gasser
] /
Building A Secure Computer System
|
8 |
Information technology- Open Systems Interconnetion - The Directory : AUthentication framework
/
[] /
ISO/IEC 9594-8
|
9 |
/
[
BIBA,K.
] /
Integrity Considerations for Secure Computer Systems
|
10 |
/
[
Harrison,M;Ruzzo,W.L.;Ullman
] /
Protection in Operation Systems
|
11 |
Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy
/
[
Abrams, Marshall.(et al.)
] /
Proceedings of the 14th National Computing Security Conference
|
12 |
/
[
Bell,D.;La Padulla, L.
] /
Secure Computer Systems
|
13 |
/
[
Denning,D.
] /
A Lattice Model of Secure Information Flow
|