[1] |
BELL D E , LAPADULA L J . Secure Computer Systems:Unified Exposition and Multics Interpretation[R]. Bedford,MA:The MITRE Corporation, 1976.
|
[2] |
BELL DE , LAPADULA LJ . Secure Computer Systems:Mathematical Foundations[R]. Bedford,MA:Electronic Systems Division,Air Force System Command Corporation,Hanscom AFB, 1973.
|
[3] |
BELL DE , LAPADULA L J . Secure Computer Systems:a Mathematical Model[R]. Bedford,MA:Electronic Systems Division,Air Force System Command Corporation,Hanscom AFB, 1973.
|
[4] |
BIBA K J . Integrity Considerations for Secure Computer Systems[R]. Bedford,MA:USAF Electronic Systems Division,Hanscom AFB, 1977.
|
[5] |
BRANSTAD D . Data categorization and labeling (executive summary)[A]. Proceedings of the 13th National Computer Security Conference[C]. Washington:NIST Press,USA, 1990. 32-33.
|
[6] |
Department of Defense Computer Security Center . Department of Defense Trusted Computer System Evaluation Criteria[S]. Fort George G.Meade,MD 20755, 1983.
|
[7] |
GLIGOR V D , BURCH E L , CHANDERSEKARAN C S . On the design and the implementation of secure Xenix workstation[A]. Proceedings of the 1986 IEEE Symposium on Security and Privacy[C]. IEEE Computer Society, 1986. 102-117.
|
[8] |
LANDWEHR CE , HEITMEYER CL , MCLEAN J . Asecurity model for military message systems[J]. ACM Transactions on Computer Systems, 1984,9(3): 198-222.
|
[9] |
MCILROY M D , REEDS J A . Multilevel security in the UNIX tradition[J]. Software Practice and Experience, 1992,22(8): 673-694.
|
[10] |
费稼轩, 张涛, 林为民 ,等. 基于动态可信度量的敏感信息安全控制模型[J]. 计算机技术与发展, 2012,22(5): 237-241. FEI J X , ZHANG T , LIN W M ,et al. Secure control model of sensitive information based on dynamic trust measurement[J]. Computer Technology and Development, 2012,22(5): 237-241.
|
[11] |
石文昌, 孙玉芳, 梁洪亮 . 经典 BLP 安全公理的一种适应性标记实施方法及其正确性[J]. 计算机研究与发展, 2001,38(11): 1366-1372. SHI W C , SUN Y F , LIANG H L . An adaptable labeling enforcement approach and its correctness for the classical BLP security axioms[J]. Computer Research and Development, 2001,38(11): 1366-1372.
|
[12] |
梁洪亮, 孙玉芳, 赵庆松 . 一个安全标记公共框架的设计与实现[J]. 软件学报, 2003,14(3): 547-552. LIANG H L , SUN YF , ZHAO Q S . Design and implementation of a security label common framework[J]. Journal of Software, 2003,14(3): 547-552.
|
[13] |
李益发, 沈昌祥 . 一种新的操作系统安全模型[J]. 中国科学 E辑, 2006,36(4): 37-356. LIYF , SHENCX . Anewkindofoperatingsystemsecuritymodel[J] Science in China Ser E, 2006,36(4): 37-356.
|
[14] |
马新强, 黄羿, 李丹宁 . 基于扩充敏感标记的格理论模型研究[J]. 计算机工程, 2009,35(21): 171-173. MA X Q , HUANG Y , LI D N . Research on lattice theoretical model based on extended sensitivity label[J]. Computer Engineering, 2009,35(21): 171-173.
|
[15] |
刘彦明, 董庆宽, 李小平 . BLP 模型的完整性增强研究[J]. 通信学报, 2010,31(2): 100-106. LIU Y M , DONG Q K , LI X P . Study on enhancing integrity for BLP model[J]. Journal on Communications, 2010,31(2): 100-106.
|
[16] |
池亚平, 樊结, 程代伟 . 基于可信等级的BLP改进模型[J]. 计算机工程, 2012,38(8): 117-119. CHI Y P , FAN J , CHENG D W . Improved BLP model based on trusted level[J]. Computer Engineering, 2012,38(8): 117-119.
|
[17] |
杨智, 金舒原, 段洣毅 ,等. 多级安全中敏感标记的最优化挖掘[J]. 软件学报, 2011,22(5): 1020-1030. YANG Z , JIN S Y , DUAN M Y ,et al. Optimal mining on security labels in multilevel security system[J]. Journal of Software, 2011,22(5): 1020-1030.
|
[18] |
孙琦, 郑德勋, 沈仲琦 . 快速数论变换[M]. 北京: 科学出版社, 1980. SUN Q , ZHENG D X , SHEN Z Q . Fast Number Theory Transform[M]. Beijing: Science PressPress, 1980.
|