Search

Showing total 2 results
2 results

Search Results

1. Security Kernel Validation in Practice.

2. A Lattice Model of Secure Information Flow.