BELL D E,LaPADULA L J.Secure computer systems:mathematical foundations(MITRE 2547)[R].Bedford:Mitre Corporation,1973.
[5]
BIBA K J.Integrity considerations for secure computersystems(MITRE 3153)[R].Bedford:Mitre Corporation,1977.
[6]
SANDHU R.Lattice-based access control models[J].IEEE Computer,1993,26(11):9-19.
[7]
蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624.CAI Yi,ZHENG Zhi-rong,SHEN Chang-xiang.A planarattributes model based on multi level security policy[J].Chinese Journal of Computers,2004,27(5):619-624.(in Chinese)
[8]
段立娟,刘燕,沈昌祥.一种多安全域策略支持的管理机制[J].北京工业大学学报,2011,37(4):609-613.DUAN Li-juan,LIU Yan,SHEN Chang-xiang.Management mechanism for multi-domain strategy[J].Journal of Beijing University of Technology,2011,37(4):609-613.(in Chinese)
[9]
卿斯汉,沈昌祥.高等级安全操作系统的设计[J].中国科学E辑:信息科学,2007,37(2):238-253.QING Si-han,SHEN Chang-xiang.An improveddynamically modified confidentiality policies model[J].Science in China Series E:Information Sciences,2007,37(2):238-253.(in Chinese)