1Peter Loscocco anJ Stephen Smalley. Integrating FlexibleSupport for Security Policies n Proceedings of the FP:EE Technical Conference (FP:EEN.
2C.Wright, C.Cowan, Module Framework" , http 01s 2002 Ism paper/Ism.pdf.
3Soft into the Linux Operating System. NIX Track: 200] USENIX Annual IX ' 01), June 2001. J.Morris et al. "Linux Security ://www. kroah, com/linux/talks/ E.Denney,B.Fischer. "Software Certif ware Certificate Management Systems" ti.arc.nasa.gov/projects/sc05/papers/denne soft.
4and cement05.pdf ication and , http:// y fischer- XU Yah-ling1 ,PAN Wei2,ZHANG Xin guo Implementation of Secure Embedded Systems Trustzone" . The 2008 International Conference on Software and Systems .ICESS2008 "Design Based on Embedded.
5Secure architecture in embedded systems: an overview :eCoSoc' 06, Montpeilier , France ,2006. http://ha archivesouver tes. fr/docs/00/12/44/12/PDF/recosoc06 pdf.