共 35 条
- [11] Zhao Y., Liu J., Han Z., Et al., The application of information leakage defense model in enterprise intranet security, Journal of Computer Research and Development, 44, 5, pp. 761-767, (2007)
- [12] Shi W., Sun Y., Liang H., An adaptable labeling enforcement approach and its correctness for the classical BLP security axioms, Journal of Computer Research and Development, 38, 11, pp. 1366-1372, (2001)
- [13] Zheng Z., Cai Y., Shen C., Research on an application class communication security model on operating system security framework, Journal of Computer Research and Development, 42, 2, pp. 322-328, (2005)
- [14] Bell D.E., La Padula L.J., Secure Computer System: Unified Exposition and Multics Interpretation, (1977)
- [15] Biba K.J., Integrity Considerations for Secure Computer Systems, (1977)
- [16] Chadwick D.W., Otenko A., The PERMIS X.509 role based privilege management infrastructure, Future Generation Computer Systems, 19, 2, pp. 277-289, (2003)
- [17] Nochta Z., Ebinger P., Abeck S., PAMINA: A certificate based privilege management system, Proceedings of Network and Distributed System Security Symposium Conference, (2002)
- [18] Osborn S., Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information & System Security, 3, 2, pp. 85-106, (2000)
- [19] Jansen W.A., A Revised Model for Role-based Access Control, (1998)
- [20] Ahn G.J., Role-based Authorization Constraints Specification, (2010)