Linda L. Vetter, Gordon Smith, Teresa F. Lunt. TCB subsets: the next step. In Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona. pages 216-221, IEEE, 1989. [doi]
@inproceedings{VetterSL89, title = {TCB subsets: the next step}, author = {Linda L. Vetter and Gordon Smith and Teresa F. Lunt}, year = {1989}, doi = {10.1109/CSAC.1989.81053}, url = {http://dx.doi.org/10.1109/CSAC.1989.81053}, researchr = {https://researchr.org/publication/VetterSL89}, cites = {0}, citedby = {0}, pages = {216-221}, booktitle = {Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona}, publisher = {IEEE}, }