Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 348-350.doi: 10.11896/j.issn.1002-137X.2017.6A.079
Previous Articles Next Articles
CHEN Jie-wei, GUAN Yu and LIU Jun
[1] 徐亮,谭煌.BLP 改进模型的形式化描述及自动化验证[J].计算机工程,2013,39(12):130-135. [2] 马萌,唐卓,李仁发,等.基于条件随机场的改进BLP访问控制模型[J].计算机科学,2015,42(8):138-144. [3] ZHANG J,YUN L J,ZHOU Z.Research of BLP and Biba dynamic union model based on check domain[C]∥Preceedings of the seventh International Conference on Machine Learning and Cybernetics.Kunming,2008:12-15. [4] 周向军.基于BLP/Biba的混合云计算数据中心安全访问控制模型[J].信息安全与技术,2016,7(1):63-65. [5] 于芳芳,马建红.基于多优化技术的ABAC模型[J].计算机应用与软件,2015,32(11):312-316. [6] 邹佳顺,张永胜,高艳.云环境下基于使用控制的ABAC模型研究[J].计算机应用研究,2014,31(12):3692-3694. [7] 倪川,黄志球,王珊珊,等.基于属性的支持策略本体推理的访问控制方法研究[J].计算机科学,2015,42(3):96-101. [8] 毋涛,张帆.云计算下基于属性的访问控制方法[J].计算机系统应用,2016,25(2):231-234. [9] BALAMURUGAN B,SHIVITHA G N,MONISHA V,et al.A Honey Bee Behaviour inspired novel Attribute-Based Access Control using Enhanced Bell-Lapadula Model in Cloud Computing[C]∥International Conference on Innovation Information in Computing Technologies(ICIICT).IEEE,2015:1-6. [10] BELL D,LAPADULA L.Secure Computer Systems:Mathema-tical Foundations and Model:echnical Report M74-244[R].MITRE Corp.,Bedford,MA 1973. [11] BIBA K J.Integrity Considerations for Secure Computer Systems: EST TR-76-372[R].ESD/AFSC,Hanscom AFB,Bedford,MA 1977. [12] HU V C,FERRAIOLO D,KUHN R,et al.Guide to attribute based access control (ABAC) definition and considerations (draft)[J].NIST Special Publication,2013,800(162). |
No related articles found! |
|