J Threet.Designing secure relational databases [D].Oklahoma,USA:University of Tulsa.1993.
[2]
Emilin C,Swamynathan S.Reason based access control for privacy protection in object relational database systems[J].International Journal of Computer Theory and Engineering,2011,3(1):32-37.
[3]
刘雄,卓雪君,汤永利,戴一奇.一种基于通道容量的多级安全模型[J].电子学报,2010,38(10):2460-2464. Liu Xiong,ZHUO Xue-jun,TANG Yong-Li,DAI Yi-qi.A Multilevel Security Model Based on Communication Channel Capacity[J].Acta Electronica Sinica,2010,38(10):2460-2464.(in Chinese)
[4]
付钰,吴晓平,等.基于模糊集与熵权理论的信息系统安全风险评估研究[J].电子学报,2010,38(7):1489-1494. FU Yu,WU Xiao-ping,et al.An approach for information system security risk assessment on fuzzy set and entropy-weight[J].Acta Electronica Sinica,2010,38(7):1489-1494.(in Chinese)
[5]
秦超,陈钟,等.中国墙策略及其在多级安全中的应用[J].北京大学学报,2002,38(3):369-374. Qin chao,Chen zhong,et al.Chinese wall policy and its extension in multilevel security system[J].Acta Scientiarum Naturalium Universitatis Pekinensis,2002,38(3):369-374.(In Chinese)
[6]
Q Ni,E Bertino,J Lobo.Risk-based access control systems built on fuzzy inferences [A].Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security [C].New York:ACM,2010.250-260.
[7]
Vasilios Katos,Dimitrios Vrakas,et al.A framework for access control with inference constraints [A].Proceedings of the 35th IEEE Annual Computer Software and Applications Conference [C].Munich:IEEE,2011.289-297.
[8]
曹利峰,陈性元,杜学绘,等.基于聚类分析的客体聚合信息级别推演方法[J].电子与信息学报,2012,34(6):1432-1437. Cao Li-feng,Chen Xing-yuan,Du Xue-hui,et al.A level inference method for aggregated information of objects based on clustering analysis[J].Journal of Electronics & Information Technology,2012,34(6):1432-1437.(in Chinese)
[9]
苗夺谦,李道国.粗糙集理论、算法与应用[M].北京:清华大学出版社.2008.2-7. Miao Duo-qian,Li Dao-guo.Rough Sets Theory,Algorithms and Applications[M].Beijing:Tsinghua University Press.2008.2-7.(in Chinese)
[10]
李凤华,苏,等.访问控制模型的研究进展与发展趋势[J].电子学报,2012,40(4):805-813. LI Feng-hua,Su Mang,et al.Research status and develop ment trends of access control model[J].Acta Electronica Sinica,2012,40(4):805-813.(in Chinese)