2Michael M. Swift,Brian N. Bershad,Henry M. Levy.Improving the reliability of commodity operating systems[J]. ACM Transactions on Computer Systems (TOCS) . 2005 (1)
3Jim Alves-Foss,Paul W. Oman,Carol Taylor,W. Scott Harrison.The MILS architecture for high-assurance embedded systems. International Journal of Embedded Systems . 2006
4The Engineering Society for Advancing Mobility Land Sea Air and Space.Guidelines and methods for conducting the safety assessment process on civil airborne systems and equipment. SAE ARP4761 . 1996
5GORDON M,UCHENICK W,MARK V.Multiple independent levels of safety and security:high assurance architecture for MSLS/MLS. Military Communication Conference . 2005
6The statistics portal.Cyber crime:average company loss in selected countries 2014. http://www.statista.com/statistics/293274/average-cyber-crime-costs-to-companies-in-selected-countries/ .
7The statistics portal.Cyber crime incidents worldwide 2014,by victim industry and size. www.statista.com/stat-istics/194246/cyber-crime-incidents-victim-industry-size/ .
8Feiler,Peter H.Challenges in validating safety-critical embedded systems. SAE International Journal of Aerospace . 2010
9JAEGER T,SAILER R,SHANKAR U.PRIMA:policy-reduced integrity measurement architecture. Proc of the 11th ACM Symposium on Access Control Models and Technologies . 2006
10Guidelines for Development of Civil Aircraft and Systems. SAE ARP4754A . 2009