[1]
S. K. Kim, H. S. Son, and S. Y. Han, “Design and Implementation of Security OS: A Case Study”, Comput. Inform., vol. 27, no. 6, pp. 931–951, Jan. 2012.