共 20 条
- [1] Bell David E., 1976, Secure Computer System: Unified Exposition and Multics Interpretation, DOI 10.21236/ADA023588
- [2] BELL DE, 1973, MTR2547 MITRE CORP, V1
- [3] Meta-policies for distributed role-based access control systems [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 106 - 115
- [5] Biba K.J., 1977, INTEGRITY CONSIDERAT
- [6] De Vimercati S. D. C., 2000, P INT SCH FOUND SEC, P137, DOI DOI 10.1007/3-540-45608-23
- [7] Denning D., 1982, Cryptography and Data Security
- [8] LATTICE MODEL OF SECURE INFORMATION-FLOW [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
- [9] Hadap S, 2000, SPRING COMP SCI, P87