共 50 条
- [2] Teaching the Security Mindset with Reference Monitors [J]. PROCEEDINGS OF THE 45TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION (SIGCSE'14), 2014, : 523 - 528
- [3] Reference Monitors for Security and Interoperability in OAuth 2.0 [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 235 - 249
- [6] Learning logic wrappers for information extraction from the Web [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 336 - 339
- [7] Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures [J]. SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 74 - 91
- [8] Enterprise wrappers for information assurance [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 120 - 122
- [9] Security wrappers and power analysis for SoC technologies [J]. CODES(PLUS)ISSS 2003: FIRST IEEE/ACM/IFIP INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE CODESIGN & SYSTEM SYNTHESIS, 2003, : 162 - 167
- [10] Reference model for creating information security policy [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 279 - 281