Boot Linux faster!

Check our new training course

Boot Linux faster!

Check our new training course
and Creative Commons CC-BY-SA
lecture and lab materials

Bootlin logo

Elixir Cross Referencer

:orphan:

.. _security-citations:

Security Document Citations
###########################

.. [SALT75] J. H. Saltzer and M. D. Schroeder, "The protection of
   information in computer systems," Proceedings ofthe IEEE, vol. 63, no.
   9, pp. 1278-1308, Sep 1975.

.. [PAUL09] M. Paul, "The Ten Best Practices for Secure Software
   Development," International Information Systems Security Certification
   Consortium, Inc. [(ISC)2 |reg|], Palm Harbor, FL, USA, 2009.

.. [MS12] Microsoft Corporation, Security Development Lifecycle - SDL
   Process Guidance Version 5.2,2012.

.. [CCITSE12] Common Criteria for Information Technology Security
   Evaluation ver. 3.1 rev. 4, 2012.

.. [MICR16] Micrium, "Certification Kits," 2016. [Online]. Available:
   https://www.micrium.com/certification/certification-kits/.

.. [NIST02] National Institute of Standards and Technology, FIPS PUB 140-2:
   Security Requirements for COMPANY PUBLIC Application note Cryptographic
   Modules, Gaithersburg, 2002.

.. [GHS10] Green Hills Software, "INTEGRITY-178B Separation Kernel Security
   Target v4.2," 2010.