TCB subsets: the next step

Linda L. Vetter, Gordon Smith, Teresa F. Lunt. TCB subsets: the next step. In Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona. pages 216-221, IEEE, 1989. [doi]

@inproceedings{VetterSL89,
  title = {TCB subsets: the next step},
  author = {Linda L. Vetter and Gordon Smith and Teresa F. Lunt},
  year = {1989},
  doi = {10.1109/CSAC.1989.81053},
  url = {http://dx.doi.org/10.1109/CSAC.1989.81053},
  researchr = {https://researchr.org/publication/VetterSL89},
  cites = {0},
  citedby = {0},
  pages = {216-221},
  booktitle = {Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona},
  publisher = {IEEE},
}