[1] |
GOGUEN J , MESEGUER J . Security policies and security models[A]. Proc IEEE Symp on Security and Privacy[C]. Oak-land, 1982.11-20.
|
[2] |
SUTHERL D . A model of information[A]. Proc 9th National Com-puter Security Conf[C]. 1986.175-183.
|
[3] |
WITTBOLD J T , JOHNSON M . Information flow in non- determinis-tic systems[A]. IEEE Symposium on Security and Privacy[C]. 1990.144-161.
|
[4] |
MCCULLOUGH D . Noninterference and the composability of secu-rity properties[A]. Proc IEEE Symp on Security and Privacy[C]. 1988.177-186.
|
[5] |
FOCARDI R , GORRIERI R . Classification of security properties(Part I:information flow)[J]. Foundations of Security Analysisand Design, 2001,2171:331-396.
|
[6] |
RYAN P . Mathematical models of computer security[J]. Foundations of Security Analysis and Design, 2001,2171:1-62.
|
[7] |
GOGUEN J , MESEGUER J . Unwinding and inference control[A]. IEEE Symp on Security and Privacy[C]. 1984.75.
|
[8] |
ROSCOE A W , GOLDSMITH M H . What is intransitive noninterfer-ence[A]. Proceedings of the 12th IEEE Computer Security Founda-tions Workshop[C]. 1999.228-238.
|
[9] |
RUSHBY J M . Design verification of secure systems[A]. Proceedings of the eighth ACM symposium on Operating systems principles[C]. 1981.12-21.
|
[10] |
BOEBER E , KAIN R . A practical alternative to hierarchical integrity policies[A]. Proceedings of the Computer Security Initiative Confer-ence[C]. 1985.
|
[11] |
HAIGH J , YOUNG W . Extending the noninterference version of MLS for SAT[J]. IEEE Trans.on Software Engineering, 1987,13(2):141-150.
|
[12] |
RUSHBY J . Noninterference,transitivity,and channel-control security policies[EB/OL]., 1992.
|
[13] |
VAN DER MEYDEN R . Architectural refinement and notions of intransitive noninterference[J]. Formal Aspects of Computing, 2012,24(4):769-792.
|
[14] |
EGGERT S , VAN DER MEYDEN R , SCHNOOR H ,et al. The com-plexity of intransitive noninterference[A]. 2011 IEEE Symposium on Security and Privacy (SP)[C]. 2011.196-211.
|
[15] |
SFAXI L , ABDELLATIF T , ROBBANA R ,et al. Information flow control of component-based distributed systems[J]. Concurrency and Computation:Practice and Experience, 2013,25(2):161-179.
|
[16] |
ZHANG Z , NAIT-ABDESSELAM F , HO P H . Boosting Markov reward models for probabilistic security evaluation by characterizing behaviors of attacker and defender[A]. Third International Conference on Availability,Reliability and Security[C]. 2008.352-359.
|
[17] |
YANG X , LIU L , ZOU R . A statistical user-behavior trust evaluation algorithm based on cloud model[A]. 2011 6th International Confer-ence on Computer Sciences and Convergence Information Technology (ICCIT)[C]. 2011.598-603.
|
[18] |
LI J , HE P . The application of fuzzy Markov chains in the analysis of internet glance behavior[A]. 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT)[C]. 2010.608-611.
|
[19] |
VASSILIOU P C G , VASILEIOU A . Asymptotic behaviour of the survival probabilities in an inhomogeneous semi-Markov model for the migration process in credit risk[J]. Linear Algebra and its Applica-tions, 2013,438(7):2880-2903.
|
[20] |
吴瀛, 江建慧 . 基于进程轨迹最小熵长度的系统调用异常检测[J]. 计算机应用, 2012,32(10):3439-3444. WU Y , JIANG J H . System call anomaly detection with least entropy length based on process traces[J]. Journal of Computer Applications, 2012,32(10):3439-3444.
|
[21] |
张兴, 陈幼雷, 沈昌祥 . 基于进程的无干扰可信模型[J]. 通信学报, 2009,30(13):6-11. ZHANG X , CHEN Y L , SHEN C X . Non-interference trusted model based on processes[J]. Journal on Communications, 2009,30(13):6-11.
|
[22] |
刘巍伟, 韩臻, 沈昌祥 . 基于终端行为的可信网络连接控制方案[J]. 通信学报, 2009,30(11):127-134. LIU W W , HAN Z , SHEN C X . Trusted network connect control based on terminal behavior[J]. Journal on Communications, 2009,30(11):127-134.
|
[23] |
谭良, 陈菊 . 可信终端动态运行环境的可信证据收集代理[J]. 软件学报, 2012,23(8):2084-2103. TAN L , CHEN J . Trusted agent for collecting trustworthiness evidence in terminal dynamical running environment[J]. Journal of Soft-ware, 2012,23(8):2084-2103.
|
[24] |
杨蓓, 吴振强, 符湘萍 . 基于可信计算的动态完整性度量模型[J]. 计算机工程, 2012,38(2):78-81. YANG B , WU Z Q , FU X P . Dynamic integrity measurement model based on trusted computing[J]. Computer Engineering, 2012,38(2):78-81.
|
[25] |
张帆, 江敏, 吴怀广 等. 一种基于无干扰的软件动态行为可信性分析方法[J]. 计算机科学, 2012,39(1):101-103. ZHANG F , JIANG M , WU H G ,et al. Approach for trust analysis of software dynamic behavior based on noninterference[J]. Computer Science, 2012,39(1):101-103.
|
[26] |
GB/Z 24294 基于互联网电子政务信息安全实施指南[S].GB/Z 24294. Guide of implementation for Internet-based E-government information security[S].
|