共 11 条
- [1] Ahmed T., 2012, CSTR2012010 UTSA
- [2] [Anonymous], 1976, TECH REP
- [3] [Anonymous], INTEGRITY CONSIDERAT
- [4] Bijon Khalid, 2012, INT S SEC COLL TECHN
- [5] LATTICE MODEL OF SECURE INFORMATION-FLOW [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
- [6] Jafarian J. H., 2009, ISECURE
- [7] Krishnan R., 2011, TISSEC
- [8] Park J., 2004, ACM Transactions on Information and Systems Security, V7, P128, DOI 10.1145/984334.984339
- [9] Ray I., 2006, COMPUTERS SECURITY, V25
- [10] Sandhu R.S., 1993, IEEE Computer, V26, P9, DOI DOI 10.1109/2.241422