[1] |
Wei Lifeng,Meng Kaikai,He lianyue.Finegranularity discretionary access control based on user’s role[J].Journal of Computer Applications,2009,29(10):28092811.(in Chinese)
|
[2] |
LSM framework [DB/OL].(20081022)[20111008]. http://book.51cto.com/art/200810/94040.htm.(in Chinese)
|
[3] |
Stephen S, Chris V, Wayne S. Implementing Selinux as a linux securiy module[R].[S,L]:NAIlabs,2002:930.
|
[4] |
Ferraiolo D F,Sandhu R,Gavrila S.Proposed NIST standard for rolebased access control[J].ACM Transactions on Information and System Security,2001,4(3):224274.
|
[5] |
Bell D E,La Padula L J.Secure computer system:Unified exposition and multics interpretation:MTR2997 Rev.1[R].Massachusetts Bedford:Mitre Corporation Bedford,1976.
|
[6] |
Kang Jungmin, Wook Shin, ChunGu, et al.Extended BLP security model based on process reliability for secure Linux kernel[C]∥IEEE 2001 Pacific Rim International Symposium,2010:299303.
|
[7] |
Zhang Xiangfeng,Sun Yufang.Dynamic enforcement of the strict integrity policy in Biba’s model[J].Journal of Computer Research and Development,2005,42(5):746754.(in Chinese)
|
[8] |
Harrington A,Jensen C D. Cryptographic access control in a distributed file system[C]∥Proc of the 8th ACM Symposium on Access Control Models and Technologies,2003:158165.
|
[9] |
Michael A H. eCryptfs:An enterprise class cryptographic filesystem for Linux[Z].USA:IBM ,2005.
|
[10] |
Tang Xiaodong,Fu Songling,He Lianyue.Design and implementation of multiuser encryption file system based on eCryptfs[J].Journal of Computer Applications,2010,30 (5):12361239.(in Chinese)
|
[11] |
He Lianyue,Liao Xiangke,Fu Songling,et al.KSEFS:A severoriented encrypted file system supporting cypertext sharing[J].Computer Engineering & Science,2011,33 (7):15.(in Chinese)
|
[12] |
Lai Yingxu,Hu Shaolong,Yang Zhen.Research of security technology based on virtualization[J].Journal of University of Science and Technology of China,2011,41(10):907914.(in Chinese)
|
|
附中文参考文献:
|
[1] |
魏立峰,孟凯凯,何连跃.面向用户角色的细粒度自主访问控制机制[J].计算机应用,2009,29 (10):28092811.
|
[2] |
LSM框架[DB/OL].(20081022)[20111008].http://book.51cto.com/art/200810/94040.htm.
|
[7] |
张相锋,孙玉芳.Biba模型中严格完整性政策的动态实施[J].计算机研究与发展,2005,42(5):746754.
|
[10] |
唐晓东,付松龄,何连跃.eCryptfs的多用户加密文件系统设计和实现[J].计算机应用, 2010,30(5):12361239.
|
[11] |
何连跃,廖湘科,付松龄,等.KSEFS:支持加密共享的服务器加密文件系统[J].计算机工程与科学,2011,33(7):15.
|
[12] |
赖英旭,胡少龙,杨震.基于虚拟机的安全技术研究[J].中国科学技术大学学报,2011,41(10):907914.
|