Computer Science ›› 2016, Vol. 43 ›› Issue (10): 141-144.doi: 10.11896/j.issn.1002-137X.2016.10.026
Previous Articles Next Articles
CHEN Liang, ZENG Rong-ren, LI Feng and YANG Wei-ming
[1] Shen Chang-xiang,Zhang Huang-guo,Feng Deng-guo,et al.The summary of information security[J].Science in China Press,2007,37(2):129-150(in Chinese) 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学 E 辑:信息科学,2007,37(2):129-150 [2] Zhang Xing,Chen You-lei,Shen Chang-xiang.A non-interfe-rence Trusted model based on process.Journal on Communications,2009,30(3):6-11(in Chinese) 张兴,陈幼雷,沈昌祥.基于进程的无干扰可信模型[J].通信学报,2009,30(3):6-11 [3] Zhao jia,Shen Chang-xiang,Liu Ji-qiang,et al.A noninterfe-rence-based trusted chain model [J].Journal of Computer Research and Development,2008,45(6):974-980(in Chinese) 赵佳,沈昌祥,刘吉强,等.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980 [4] Rushby J.Noninterference,transitivity,and channel-control security policies[M].SRI International,Computer Science Laboratory,1992 [5] Liu Wei-peng,Zhang Xing.Research of duality and multi-level security model based on intransitive noninterference theory[J].Journal on Communications,2009,30(2):52-58(in Chinese) 刘威鹏,张兴.基于非传递无干扰理论的二元多级安全模型研究[J].通信学报,2009,30(2):52-58 [6] Chen Ju,Tan Liang.Trusted Terminal Model Based on Process Protection[J].Computer Science,2011,38(4):115-117(in Chinese) 陈菊,谭良.一个基于进程保护的可信终端模型[J].计算机科学,2011,38(4):115-117 [7] Xu Fu.Intransitive Noninterference Trusted Model SupportingProcess Codes Modification[J].Computer Engineering,2013,39(11):150-153,168(in Chinese) 徐甫.支持进程代码修改的非传递无干扰可信模型[J].计算机工程,2013,39(11):150-153,8 [8] Qin Xi,Chang Chao-wen,Shen Chang-xiang,et al.Research on Trusted Terminal Computer Model Tolerating Untrusted Componenets[J].Chinese Journal of Electronics,2011,39(4):934-939(in Chinese) 秦晰,常朝稳,沈昌祥,等.容忍非信任组件的可信终端模型研究[J].电子学报,2011,39(4):934-939 [9] Goguen J A,Meseguer J.EQLOG:Equality,types,and generic Modules for logic programming[M].Functional and Logic Programming.DeGroot D,Lindstrom G.eds.,Springer-Verlag,1986 [10] 梁元.基于云计算环境下的可信平台设计[D].成都:电子科技大学,2013 [11] Zhu C,Dai X.Model of trust management based on finite statemachine[C]∥2012 International Conference on Cyber Security,Cyber Warfare and Digital Forensic (CyberSec).IEEE,2012:161-164 [12] Si Li-min,Cai Mian,Chen Yin-jing,et al.Research of a Trust Chain Transfer Model[J].Computer Science,2011,38(9):79-81(in Chinese) 司丽敏,蔡勉,陈银镜,等.一种信任链传递模型研究[J].计算机科学,2011,38(9):79-81 [13] Zhang Xing,Huang Qiang,Shen Chang-xiang.A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform[J].Chinese Journal of Computers,2010,33(1):74-81(in Chinese) 张兴,黄强,沈昌祥.一种基于无干扰模型的信任链传递分析方法[J].计算机学报,2010,33(1):74-81 |
No related articles found! |
|