共 10 条
- [1] Belt-LaPadula Axioms: A "New" Paradigm for An "Old" Model. T. Y. Lin. Proc. 1992 ACM SIGSAC New Security Paradigms Workshop . 1992
- [2] Departm ent ofDefenseTrustedCom puterSystemEvaluationCriteria. DoD 5200.28-STD . 1985
- [3] On the design and the implementation of secure Xenix workstations. V D Gligor,E L Burch,C S Chandersekaran et al. In: Proc of the 1986 IEEE Symposium on Security and Privacy . 1986
- [4] Policy vs mechanism in the secure TUNIS operating system. G L Grenier,R C Holt,M Funkenhauser. In: 1989 IEEE Symposium on Security and Privacy . 1989
- [5] A VMM security kernel for the VAX architecture. P A Karger,M E Zurko,D W Bonin et al. In: 1990 IEEE Computer Society Symposium on Research in Security and Privacy . 1990
- [6] The army secure operating system. N A Waldhart. In: 1990 IEEE Computer Society Symposium on Research in Security and Privacy . 1990
- [7] Integrating flexible support for security policies into the Linux operating system. P Loscocco,S Smalley. . 2001
- [8] SystemV/MLS labeling and mandatory policy alternatives. FlinkII CW,WeissJD. AT&T TechnicalJournal . 1988
- [9] DTOS Generalized Security Policy Specification. Secure Computing Coroporation. Technical report MDA904-93-C-4209 DTOS CDRL A019 Secure Computing Corporation . 1997
- [10] The flask security architecture: System support for diverse security policies.In: Proc of the 8th USENIX Security Symposium. Ray Spencer,Stephen Smalley,Peter Loscocco et al. Washington, DC . 1999