共 21 条
[1]
[Anonymous], 1992, 15 NAT COMP SEC C
[2]
[Anonymous], MTR2997 MITR CORP
[3]
Barker SK, 2009, ST ANDR STUD REFORM, P187, DOI 10.1145/1542207.1542238
[4]
BECKER MY, 2007, P CSF 07, P3
[5]
Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295
[6]
Crampton J., 2003, P 8 ACM S ACCESS CON, P43
[7]
Damianou N, 2001, LECT NOTES COMPUT SC, V1995, P18
[8]
DoD Computer Security Center, 1985, TRUST COMP SYST EV C
[9]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
[10]
Ferraiolo David., 2008, SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, P153