Поиск по сайту

Information

По вашему запросу найдено материалов: 1
Искать:
Kachanov M. A., Kachanov M. A. «SECURITY ANALYSIS OF INFORMATION FLOWS IN GNU/LINUX OPERATING SYSTEMS» // 2010. №3(9) C.77-89
Devyanin P. N. «Security violation necessary conditions for time information flows in MROSL DP-model» // Applied Discrete Mathematics. Supplement 2015. №8 C.81-83
Devyanin P. N. «Security conditions for information flows by memory within the mrosl DP-model» // Applied Discrete Mathematics 2014. №7 (Приложение) C.82-85
Devyanin P. N., Devyanin P. N. «About results of designing hierarchical representation of mrosl DP-model» // Applied Discrete Mathematics. Supplement 2016. №9 C.83-87
Ryzhkov V. I., Ryzhkov V. I. «Using digital certificates for authorization by proxy in os Linux» // Applied Discrete Mathematics 2014. №7 (Приложение) C.94-96
Ryzhkov V. I., Ryzhkov V. I. «Using digital certificates for authorization by proxy in os Linux» // 2014. №7 C.94-96