Prem Uppuluri.Intrusion detection/prevention using behavior specifications[D].NY,USA:State University of New York at Stony Brook,2003.
[4]
HC Kim,RS Ramakrishna,W Shin,K Sakurai.Enforcement of integrated security policy in trusted operating systems[M/CD].Nara,Japan:Springer Berlin/Heidelberg,2007.214-229.
[5]
Jansen W,Karygiannis T,Korolev V,et al.Policy expression and enforcement for handheld devices[R].Gaithersburg,Maryland,USA:Computer Security Division Information Technology Lalxratory NIST,2003.
[6]
R Sekar,V Venkatakrishnan,S Basu,S Bhatkar,D DuVamey.Model-carrying codc:A practical approach for safe execution of urinated applications[J].ACM SlGOPS Operating Systems Review,2003,37(5):15-28.
SK Nair,PND Simpson,B Crispo,AS Tanenbatma.A virtual machine based information flow control system for policy enforcernent[J].Electronic Notes in Theoretical Computer Science 2008,197(1):3-16.