Strict Integrity Policy of Biba Model with Dynamic Characteristics and its Correctness
暂无分享,去创建一个
[1] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[2] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[3] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[4] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[5] Daniel F. Sterne,et al. A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..
[6] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[7] Zhang Xiangfeng and Sun Yufang. Dynamic Enforcement of the Strict Integrity Policy in Biba's Model , 2005 .
[8] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.