Зарубежные нормативные документы и критерии на английском / NCSC-TG-010 A Guide
.pdfWALT74a |
________, “Modeling The Security Interface,” Case Western Reserve University, |
|
|
August 1974. |
|
WEIS69 |
Weissman, C., “Security Controls in the ADEPT-SO Time Sharing System,” |
1969 |
|
AFlPS Fall Joint Computer Conference, Vol. 35, pp. 119-133, AFIPS Press, 1969. |
|
WHIT84 |
The White House, National Policy on Telecommunications and Automated |
|
|
Information Systems Security, NSDD-145, September 1984. |
|
WILL91 |
Williams, J. G., “Modeling Nondisclosure in Terms of the Subject-Instruction |
|
|
Stream,” 1991 Symposium on Research in Security and Privacy, lEEE, May 1991. |
|
WISE90 |
Wiseman, S. R., “On the Problem of Security in Databases,” in Database Security, III: |
|
|
Status and Prospects, pp. 301-310, edited by D. L. Spooner and C. Landwehr, North- |
|
|
Holland/IFIP, 1990. |
|
WITT9O |
Wittbold, J. T., and D. M. Johnson, “Information Flow in Nondeterministic Systems,” |
|
|
1990 Symposium on Research in Security and Privacy, pp. 144-161, lEEE, May 1990. |
|
WOOD87 |
Woodward, J. P. L., “Exploiting the Dual Nature of Sensitivity Labels,” |
1987 |
|
Symposium on Security and Privacy, pp. 23-30, lEEE, April 1987.US. |
|
GOVERNMENT PRINTING OFFICE 1996-717-902/82621