[1] |
CHANDY K M , LAMPORT L . Distributed snapshots:determining global states of a distributed system[J]. ACM Transactions on Computer Systems, 1985,3(1): 63-75.
|
[2] |
BELL D E , PADULA L J L . Secure computer system:unified exposition and multics interpretation[J]. Secure Computer System Unified Exposition & Multics Interpretation, 1976.
|
[3] |
ISO 7498-2:1989(en)[S].
|
[4] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-166.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal of Communications, 2016,37(11): 156-166.
|
[5] |
WOO T Y C , LAM S S . Authorization in distributed systems:a formal approach[C]// IEEE Computer Society Symposium on Research in Security and Privacy. 1992: 33-33.
|
[6] |
BLAZE M , FEIGENBAUM J , LACY J . Decentralized trust management[J]. Proceedings of IEEE Conference security & Privacy, 1996,30(1): 164-173.
|
[7] |
Blaze M . The KeyNote Trust-Management System Version 2[J]. At& T Research Labs, 1999.
|
[8] |
李甲帅, 彭长根, 朱义杰 ,等. 面向 Hadoop 的风险访问控制模型[J]. 网络与信息安全学报, 2016,2(1): 46-52.
|
|
LI J S , PENG C G , ZHU Y J ,et al. Risk access control model for Hadoop[J]. Chinese Journal of Network and Information Security, 2016,2(1): 46-52.
|
[9] |
LIU X T , LI X W , CUI X . Research on trust computing based multilevel security policy[J]. Electronic Design Engineering, 2016.
|
[10] |
JING S , CHEN X , DU X ,et al. Distributed multilevel security core architecture based on noninterference theory[J]. Journal of Computer Applications, 2013,33(3): 712-716.
|
[11] |
SCHUPPEN J H V . Research program for control of distributed and of multilevel systems[M]// Coordination Control of Distributed Systems. Berlin: Springer, 2015: 385-392.
|
[12] |
BATRA N , SINGH M . Multilevel policy based security in distributed database[M]// Advances in Computing and Communications. Berlin : Springer, 2011: 572-580.
|
[13] |
ARLEO A , DIDIMO W , LIOTTA G ,et al. A distributed multilevel force-directed algorithm[C]// The International Symposium on Graph Drawing and Network Visualization. 2016: 3-17.
|
[14] |
HUSSAIN S A , FATIMA M , SAEED A ,et al. Multilevel classification of security concerns in cloud computing[J]. Applied Computing & Informatics, 2016.
|
[15] |
eXtensible Access Control Markup Language (XACML) Version 3.0[S]. 2013.
|