共 50 条
- [31] Security Considerations for the Development of Secure Software Systems [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 1187 - 1193
- [32] DEVELOPING SECURE SOFTWARE AND SECURITY GUIDELINES FOR IT SYSTEMS [J]. SIEMENS REVIEW, 1990, 57 (02): : 28 - 33
- [34] Secure systems design technology [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 63 - 71
- [36] An operating system design for the security architecture for microprocessors [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 174 - +
- [37] Design and implementation MAC in security operating system [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 216 - 219
- [38] A research on secure methodology considering assurances and processes for developing high reliable security systems [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 29 - 32
- [39] Support for Secure Code Execution in Server Operating Systems [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 21 - 30
- [40] A New Methodology for the Development of Secure and Paranoid Operating Systems [J]. INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES 2020 (CENTERIS/PROJMAN/HCIST 2020), 2021, 181 : 1207 - 1215