Computer Science ›› 2013, Vol. 40 ›› Issue (8): 124-128.
Previous Articles Next Articles
CAO Li-feng,LI Zhong,CHEN Xing-yuan and FENG Yu
[1] GB/T 22239-2008.信息安全技术信息系统安全等级保护基本要求[S].中国国家标准化管理委员会,2008 [2] Bell P D E,Padula L J L.Secure computer system:unified exposition and multics interpretation[R].ESD-TR-75-306.MTR 2997Rev.1,The MITRE Corporation,1976 [3] 季庆光,卿斯汉,等.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557 [4] 何建波,卿斯汉,等.对两个改进的BLP模型分析[J].软件学报,2007,18(6):1501-1509 [5] Peng P C,Rohatgi P,Keser C.Fuzzy multi-level security:an experiment on quantified risk-adaptive access control[C]∥IEEE Symposium on Security and Privacy.Oakland,CA,May 2007:222-230 [6] Magnani M,Montesi D.A Unified Approach to Structured,Se-mistructured and Unstructured Data[R].UBLCS- 2004-9.University of Bologna,2004 [7] Lee T Y.Formalisms on Semi-structured and Unstructured Data Schema Computations [D].University of Hong Kong,Hong Kong Special Administrative Region,2010 [8] 李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537 [9] Oudkerk S.A Proposal for an XML Confidentiality Label and Related Binding of Metadata to Data Objects[R].RTO-MP-IST-091-22.NATO C3Agency.2010 [10] Blazic A J,Saljic S.Confidentiality Labeling Using StructuredData Types[C]∥2010Fourth International Conferences on Di-gital Society.ST,Maarten,Feb.2010:182-187 [11] Pernul G,Winiwarter W,Tjoa A M.The entity-relationshipmodel for multilevel security[C]∥Proceedings of the 12th international conference on the entity-relationship approach:entity- relationship approach.Arlington,Texas,USA,December 1994:166-177 |
No related articles found! |
|