共 50 条
[21]
Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection
[J].
2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC),
2014,
:1004-1009
[22]
A multi-policy model for access control in Cooperative Information Systems
[J].
8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012),
2012,
:996-1001
[25]
Research on Mandatory Access Control Model for Application System
[J].
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS,
2009,
:159-163
[27]
A mandatory access control model with temporal and spatial constraints
[J].
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications,
2012, 35 (05)
:111-114
[28]
A Comparative Analysis of Linux Mandatory Access Control Policy Enforcement Mechanisms
[J].
PROCEEDINGS OF THE 2023 EUROPEAN WORKSHOP ON SYSTEM SECURITY, EUROSEC 2023,
2023,
:1-7
[30]
Compatible and Usable Mandatory Access Control for Good-enough OS Security
[J].
PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I,
2009,
:246-250