M. Schaefer, Roger R. Schell Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:41-51 [Conf]
Roger R. Schell Evaluating Security Properties of Computer Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1983, pp:89-95 [Conf]
Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP