A Mandatory Access Control Model with Enhanced Flexibility
暂无分享,去创建一个
[1] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[2] Theodore M. P. Lee,et al. Using mandatory integrity to enforce 'commercial' security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[3] Jian-Bo He. Analysis of Two Improved BLP Models , 2007 .
[4] Cai Yi. A Planar Attributes Model Based on Multi Level Security Policy , 2004 .
[5] Mike Hibler,et al. The Flask Security Architecture: System Support for Diverse Security Policies , 1999, USENIX Security Symposium.
[6] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[7] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[8] Ji Qing,et al. An Improved Dynamically Modified Confidentiality Policies Model , 2004 .
[9] Sun Bo,et al. Design and Implementation of a Security Label Common Framework , 2003 .
[10] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .