BISHOP M.Computer security:art and science[M].Boston,MA:Addison-Wesley,2003.
[2]
SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].Computer,1996,29(2):38-47.
[3]
WALKER K M.Confining root programs with domain and type enforcement(DTE)[C]∥Proceedings of 1996 USENIXSecurity Symposium,San Jose,CA,July 22-25,1996:21-36.
[4]
HOFFMAN J.Implementing RBAC on a type enforced system[C]∥Secure Compute Corp.Proceedings of the 13th AnnualComputer Security Applications Conference(ACSAC’97),San Diego,CA,December 8-12,1997:158-163.
[5]
杨涛,沈昌祥,陈福接.一个用于安全操作系统特权管理的改进Bell-La Padula模型[J].计算机研究与发展,1993,30(1):45-49YANG Tao,SHEN Chang-xiang,CHEN Fu-jie.A secure operating system privileges for the improvement of the managementof Bell-La Padula model[J].Journal of Computer Research and Development,1993,30(1):45-49.(in Chinese)
[6]
张德银,刘连忠.多安全域下访问控制模型研究[J].计算机应用,2008,28(3):633-636.ZHANG De-yin,LIU Lian-zhong.Research of access control model in multi-domain[J].Computer Applications,2008,28(3):633-636.(in Chinese)
[7]
张智杰.安全域划分关键理论与应用实现[D].昆明:昆明理工大学计算机学院,2008.ZHANG Zhi-jie.On theory of partition of secure area and its application[D].Kunming:Kunming University of Science andTechnology,2008.(in Chinese)
[8]
黄强,沈昌祥,陈幼雷.基于可信计算的保密和完整性统一安全策略[J].计算机工程与应用,2006,42(10):15-18.HUANG Qiang,SHEN Chang-xiang,CHEN You-lei.Secrecy/integrity union MLS policy based on trusting computing[J].Computer Engineering and Applications,2006,42(10):15-18.(in Chinese)
[9]
付长胜,肖侬,赵英杰.基于协商的跨社区访问的动态角色转换机制[J].软件学报,2008,10(19):2754-2761.FU Chang-sheng,XIAO Nong,ZHAO Ying-jie.Security protocol and scheme for inter-realm information accessing[J].Journal of Software,2008,10(19):2754-2761.(in Chinese)