共 16 条
- [1] Bell D.E., Lapadula L.J., Secure Computer Systems: Mathematical Foundations, (1973)
- [2] Biba K.J., Integrity considerations for secure computer system, (1977)
- [3] Biba K.J., Integrity considerations for secure computer systems, (1997)
- [4] Clark D.D., Wilson D.R., A comparison of commercial and military computer security policies, Proceedings of 1987 IEEE Symposium on Research in Security and Privacy, pp. 184-194, (1987)
- [5] Polk W., Approximating Clark-Wilson access triples with basic UNIX controls, Proceedings of the 4th USENIX UNIX Security Symposium, pp. 45-154, (1993)
- [6] Sandhu R.S., Jaehong P., Usage control: a vision for next generation access control, Proceedings of Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 17-31, (2003)
- [7] Michiharu K., Satoshi H., XML document security based on provisional authorization, Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 87-96, (2000)
- [8] Xia Q., Fan X., Yin X., RBAC delegation model research based on time, Journal of Northwest University, 38, 6, pp. 932-936, (2008)
- [9] Shi W., Sun Y., Liang H., An adaptable labeling enforcement approach and its correctness for the classical BLP security axioms, Journal of Computer Research & Development, 38, 11, pp. 1366-1372, (2001)
- [10] Thomas R.K., Sandhu R.S., Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, IFIP Conference Proceedings, pp. 166-181, (1997)