共 50 条
- [21] Security Characteristics of Commercial Minicomputer Operating Systems. Elektronische Rechenanlagen mit Computer Praxis, 1984, 26 (02): : 89 - 94
- [22] A security verification method for information flow security policies implemented in operating systems INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 280 - 291
- [23] Network security: Then and now or 20 years in 10 minutes PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 117 - 117
- [24] THE SOCIAL-SECURITY ACT - 20 YEARS EXPERIENCE JOURNAL OF ACCOUNTANCY, 1956, 102 (02): : 27 - 34
- [25] 20 YEARS EXPERIENCE OPERATING THORACIC AORTIC-ANEURYSMS LANGENBECKS ARCHIV FUR CHIRURGIE, 1990, : 475 - 480
- [26] ONLINE DYNAMIC TESTING OF SECURITY AND INTEGRITY OF OPERATING SYSTEMS. IBM Technical Disclosure Bulletin, 1974, 17 (05): : 1508 - 1512
- [27] An Autonomic Security Monitor for Distributed Operating Systems (Invited Paper) TOWARDS A SERVICE-BASED INTERNET, 2011, 6994 : 112 - +
- [28] Modelling security risks in real-time operating systems 2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 125 - 130
- [29] A Survey on Resource Management and Security Issues in IoT Operating Systems 2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 26 - 30
- [30] In Guards we trust: Security and Privacy in Operating Systems revisited 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 578 - 585