[1]Bishop M. Computer security:Art and science[M]. Boston:Addison Wesley, 2002.
[2]Zhang Jun, Zhou Zheng, Li Jian, et al. Confidentiality and integrity dynamic union model based on MLS policy[J]. Computer Engineering and Applications,2008,44(12):1921. (in Chinese)
[3]Zhang Xiangfeng,Sun Yufang.Dynamic enforcement of the strict integrity policy in Biba’s model[J]. Journal of Computer Research and Development, 2005,42(5):746754.(in Chinese)
[4]Zhou Zhouyi, He Yeping, Liang Hongliang. Hybrid mandatory integrity model composed of Biba and clarkwilson policy[J]. Journal of Software, 2010,21(1):98106. (in Chinese)
[5]Luo Qin, Wang Xiaoming, Fu zhengfang. An improvement of clarkwilson integrity model[J]. Microelectronics & Computer, 2007,24(7):128131. (in Chinese)
[6]Liu Zun, Wang Tao,Li Weihua. Role based integrity control model for operating system[J]. Computer Science, 2010,37(1):8790. (in Chinese)
[7]Hu Ming, Pan Xuezeng, Li Wen. Design and implementation of improved multiplelevel security model[J]. Computer Engineering and Applications, 2011,47(4):7780.(in Chinese)
[8]Galagher P R. A guide to understanding audit in trusted systems[M].US:National Computer Secuirty Center (NCSC), 1987.
[9]Common criteria for information technology security evaluation(Version2.3)[S].Common Criteria Recognition Agreement(CCRA), 2005.
[10]Wu Xinsong, Zhou Zhouyi, He Yeping, et al. Static analysis of a class of memory leaks in trusted BSD MAC framework[C]∥Proc of ISPEC’09, 2009:8392.
[12]Riley S. Windows Vista system integrity technologies [R]. Microsoft, 2006:162.
[11]Wright C, Cowan C, Morris J, et al. Linux security modules:General security support for the Linux kernel[EB/OL].[20030520].http://lsm.immunix.org.
附中文参考文献:
[2]张俊, 周正, 李建, 等.基于MLS 策略的机密性和完整性动态统一模型[J]. 计算机工程与应用,2008,44(12):1921.
[3]张相锋,孙玉芳.Biba模型中严格完整性政策的动态实施[J]. 计算机研究与发展,2005,42(5):746754.
[4]周洲仪,贺也平,梁洪亮.基于Biba和ClarkWilson策略的混合强制完整性模型[J].软件学报,2010,21(1):98106.
[5]罗琴,王小明,付争方.一种改进的Clark_Wilson完整性策略模型[J]. 微电子学与计算机,2007,24(7):128131.
[6]刘尊, 王涛, 李伟华. 基于角色的操作系统完整性控制模型[J]. 计算机科学, 2010,37(1):8790.
[7]胡明,潘雪增,李文.改进的多级安全模型的设计与实现[J]. 计算机工程与应用,2011,47(4):7780. |