A discuss of computer security strategy models
暂无分享,去创建一个
[1] Guixiong Liu,et al. Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection , 2009, 2009 International Conference on Computational Intelligence and Security.
[2] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[3] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[4] T. Young. CHINESE WALL SECURITY MODEL AND CONFLICT ANALYSIS , 2000 .
[5] Tsau Young Lin,et al. Chinese wall security policy-an aggressive model , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.
[6] Joos Vandewalle,et al. Simultaneous enforcement of the Bell-LaPadula and the Biba security policy models in an OSI-distributed system , 1992, [Proceedings] Singapore ICCS/ISITA `92.