Verifying Information Flow Goals in Security-Enhanced Linux

Journal of Computer Security - Netherlands
doi 10.3233/jcs-2005-13105

Related search