Ontology Security Strategy of Security Data Integrity
暂无分享,去创建一个
[1] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[2] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[3] Timothy W. Finin,et al. Enabling Technology for Knowledge Sharing , 1991, AI Mag..
[4] Shi Wen. AN ADAPTABLE LABELING ENFORCEMENT APPROACH AND ITS CORRECTNESS FOR THE CLASSICAL BLP SECURITY AXIOMS , 2001 .
[5] Ji Qing,et al. An Improved Dynamically Modified Confidentiality Policies Model , 2004 .
[6] K. J. Bma. Integrity considerations for secure computer systems , 1977 .