Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2011_3_a3, author = {D. A. Stefantsov}, title = {Implementation of security policies in programming information processing systems}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {55--64}, publisher = {mathdoc}, number = {3}, year = {2011}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2011_3_a3/} }
D. A. Stefantsov. Implementation of security policies in programming information processing systems. Prikladnaâ diskretnaâ matematika, no. 3 (2011), pp. 55-64. http://geodesic.mathdoc.fr/item/PDM_2011_3_a3/
[1] Bell D. E., LaPadula L. J., Secure computer system: Unified exposition and multics interpretation, Tech. Rep. ESD-TR-75-306, The MITRE Corporation, 1976
[2] Landwehr C. E., “Formal models for computer security”, ACM Comput. Surv., 13:3 (1981), 247–278 | DOI
[3] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.
[4] DoD 5200.28-STD (Trusted Computer System Evaluation Criteria), National Computer Security Center, USA, 1985, 116 pp.
[5] Security-Enhanced Linux, , 2009 http://www.nsa.gov/research/selinux/index.shtml
[6] Technical Note TN2127, Kernel Authorization, , 2010 http://developer.apple.com/library/mac/technotes/tn2127/_index.html
[7] NetBSD Kernel Developer's Manual. KAUTH, , 2009 http://netbsd.gw.com/cgi-bin/man-cgi?kauth+9+NetBSD-current
[8] Implementing Jails Under the kauth Framework, , 2008 http://2008.asiabsdcon.org/papers/P3A-paper.pdf
[9] Elrad T., Filman R. E., Bader A., “Aspect-Oriented Programming”, Commun. ACM, 44:10 (2001), 29–32 | DOI
[10] Stefantsov D. A., “Realizatsiya politik bezopasnosti v kompyuternykh sistemakh s pomoschyu aspektno-orientirovannogo programmirovaniya”, Prikladnaya diskretnaya matematika, 2008, no. 1, 94–100
[11] Stefantsov D. A., “Tekhnologiya i instrumentalnaya sreda sozdaniya zaschischënnykh sistem obrabotki informatsii”, Prikladnaya diskretnaya matematika, 2009, Prilozhenie No 1, 55–56
[12] Bouraqadi N., Seriai A., Leblanc G., “Towards unified aspect-oriented programming”, ESUG 2005 Research Conference, Brussels, Belgium, 2005, 22 pp.
[13] Kiczales G., The Art of Meta-Object Protocol, The MIT Press, 1991, 345 pp.
[14] The AspectJ Project, , 2011 http://eclipse.org/aspectj
[15] Kiczales G., Hilsdale E., Hugunin J., et al., “Getting Started with AspectJ”, Commun. ACM, 44:10 (2001), 59–65 | DOI
[16] Diaz Pace J. A., Campo M. R., “Analyzing the Role of Aspects in Software Design”, Commun. ACM, 44:10 (2001), 67–73
[17] Lieberherr K., Orleans D., Ovlinger J., “Aspect-Oritnted Programming with Adaptive Methods”, Commun. ACM, 44:10 (2001), 39–41 | DOI
[18] Bergmans L., Aksit M., “Composing Crosscutting Concerns Using Composition Filters”, Commun. ACM, 44:10 (2001), 51–57 | DOI
[19] Goldberg A., Robson D., Smalltalk 80 – The Language and its implementation, v. 1, Addison-Wesley, 1983, 714 pp. | Zbl
[20] Akho A., Ulman Dzh., Seti R., Kompilyatory: printsipy, tekhnologii i instrumenty, Vilyams, M., 2003, 768 pp.
[21] Abelson Kh., Sassman Dzh., Struktura i interpretatsiya kompyuternykh programm, Dobrosvet, M., 2006, 608 pp.