Bell D E, LaPadula L J. Secure computer system. unifed exposition and multics interpretation. Bedford, Massachusetts: The MITRE Corporation, 1976.
[2]
Biba K J. Integrity considerations for secure computer systems. Bedford, Massachusetts: The MITRE Corporation, 1977.
[3]
Clark D D, Wilson D R. A comparison of commercial and military security policies//Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy. Oakland:, 1987: 184-194.
[4]
Brewer D, Nash M. The Chinese wall security policy//Proceedings of the 1989 IEEE Symposium on Security and Privacy. Oakland: , 1989: 206-214.
[5]
Sandhu R, Coyne E J, Feinstein H L, et al. Role-Based access control models[J]. IEEE Computer, 1996, 29(2): 38-47.
[6]
肖军模. 对军用安全模型的扩展[J]. 电子科技大学学报, 2005, 34(2):186-189. Xiao Junmo. Extension to military security model[J]. Journal of University of Electronic Science and Technology of China, 2005, 34(2): 186-189.
[7]
Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security, 2000, 3(2): 85-106.
[8]
Kuhn D R. Role based access control on MLS systems without kernel changes//Proceedings of the third ACM Workshop on Role-Based Access Control. Fairfax: , 1998: 25-32.
[9]
Osborn S. Mandatory access control and role-based access control revisited//Proceedings of Second ACM Workshop on Role-Based Access Control. Fairfax: , 1997: 31-40.