共 10 条
[1]
Belt-LaPadula Axioms: A "New" Paradigm for An "Old" Model. T. Y. Lin. Proc. 1992 ACM SIGSAC New Security Paradigms Workshop . 1992
[2]
Departm ent ofDefenseTrustedCom puterSystemEvaluationCriteria. DoD 5200.28-STD . 1985
[3]
On the design and the implementation of secure Xenix workstations. V D Gligor,E L Burch,C S Chandersekaran et al. In: Proc of the 1986 IEEE Symposium on Security and Privacy . 1986
[4]
Policy vs mechanism in the secure TUNIS operating system. G L Grenier,R C Holt,M Funkenhauser. In: 1989 IEEE Symposium on Security and Privacy . 1989
[5]
A VMM security kernel for the VAX architecture. P A Karger,M E Zurko,D W Bonin et al. In: 1990 IEEE Computer Society Symposium on Research in Security and Privacy . 1990
[6]
The army secure operating system. N A Waldhart. In: 1990 IEEE Computer Society Symposium on Research in Security and Privacy . 1990
[7]
Integrating flexible support for security policies into the Linux operating system. P Loscocco,S Smalley. . 2001
[8]
SystemV/MLS labeling and mandatory policy alternatives. FlinkII CW,WeissJD. AT&T TechnicalJournal . 1988
[9]
DTOS Generalized Security Policy Specification. Secure Computing Coroporation. Technical report MDA904-93-C-4209 DTOS CDRL A019 Secure Computing Corporation . 1997
[10]
The flask security architecture: System support for diverse security policies.In: Proc of the 8th USENIX Security Symposium. Ray Spencer,Stephen Smalley,Peter Loscocco et al. Washington, DC . 1999