Скачиваний:
58
Добавлен:
02.05.2014
Размер:
501.7 Кб
Скачать

WALT74a

________, “Modeling The Security Interface,” Case Western Reserve University,

 

August 1974.

 

WEIS69

Weissman, C., “Security Controls in the ADEPT-SO Time Sharing System,”

1969

 

AFlPS Fall Joint Computer Conference, Vol. 35, pp. 119-133, AFIPS Press, 1969.

WHIT84

The White House, National Policy on Telecommunications and Automated

 

Information Systems Security, NSDD-145, September 1984.

 

WILL91

Williams, J. G., “Modeling Nondisclosure in Terms of the Subject-Instruction

 

Stream,” 1991 Symposium on Research in Security and Privacy, lEEE, May 1991.

WISE90

Wiseman, S. R., “On the Problem of Security in Databases,” in Database Security, III:

 

Status and Prospects, pp. 301-310, edited by D. L. Spooner and C. Landwehr, North-

 

Holland/IFIP, 1990.

 

WITT9O

Wittbold, J. T., and D. M. Johnson, “Information Flow in Nondeterministic Systems,”

 

1990 Symposium on Research in Security and Privacy, pp. 144-161, lEEE, May 1990.

WOOD87

Woodward, J. P. L., “Exploiting the Dual Nature of Sensitivity Labels,”

1987

 

Symposium on Security and Privacy, pp. 23-30, lEEE, April 1987.US.

 

GOVERNMENT PRINTING OFFICE 1996-717-902/82621

Соседние файлы в папке Зарубежные нормативные документы и критерии на английском