메뉴 건너뛰기




Volumn 43, Issue 3, 1998, Pages 233-244

An effective model for composition of secure systems

Author keywords

[No Author keywords available]

Indexed keywords

COST EFFECTIVENESS; DISTRIBUTED COMPUTER SYSTEMS; LARGE SCALE SYSTEMS; SECURITY OF DATA;

EID: 0032202421     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0164-1212(98)10036-5     Document Type: Article
Times cited : (14)

References (19)
  • 8
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • Kemmerer, R.A., 1983. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Transactions on Computer Systems 1 (3), 256-277.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 256-277
    • Kemmerer, R.A.1
  • 9
    • 0029509895 scopus 로고
    • Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models
    • Maneki, A.P., 1995. Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models. In: Proceedings of The Computer Security Foundations Workshop, pp. 16-23.
    • (1995) Proceedings of the Computer Security Foundations Workshop , pp. 16-23
    • Maneki, A.P.1
  • 11
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibility" properties
    • McLean, J., 1996. A general theory of composition for a class of "possibility" properties. IEEE Transactions on Software Engineering 22 (1), 53-67.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 12


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.