共 50 条
- [1] An information flow security policy verification methodology and its application in operating systems [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 700 - 703
- [2] Definition of Information Systems Security Policies [J]. RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2017, 571 : 225 - 234
- [5] Compliance Verification Algorithm for Computer Systems Security Policies [J]. E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 96 - 115
- [6] Verification of Cloud Security Policies [J]. 2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
- [8] Information flow query and verification for security policy of Security-Enhanced Linux [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 389 - 404
- [9] Specification of Information Flow Security Policies in Model-Based Systems Engineering [J]. SOFTWARE TECHNOLOGIES: APPLICATIONS AND FOUNDATIONS, 2018, 11176 : 617 - 632
- [10] Information flow security for interactive systems [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 1045 - 1054