TCB subsets: the next step

Linda L. Vetter, Gordon Smith, Teresa F. Lunt. TCB subsets: the next step. In Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona. pages 216-221, IEEE, 1989. [doi]

Authors

Linda L. Vetter

This author has not been identified. Look up 'Linda L. Vetter' in Google

Gordon Smith

This author has not been identified. Look up 'Gordon Smith' in Google

Teresa F. Lunt

This author has not been identified. Look up 'Teresa F. Lunt' in Google