共 7 条
- [1] [Anonymous], 2006, IEEE COMPUTER
- [2] BOMIN N, 2002, COMPUTER ENG, V28, P181
- [3] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
- [4] KOSIYATRAKUL, 2005, LECT NOTES COMPUTER, P179
- [5] Moffett J.D., 1998, PROC ACM WORK ROLE B, P63, DOI [10.1145/286884.286900, DOI 10.1145/286884.286900]
- [6] Sandhu R., 1999, Journal of Computer Security, V7, P317
- [7] XUE W, 2005, BEIJING HANGKONG HAN, V3, P298