共 5 条
[1]
Secure Computer Systems: MathematicalFoundations. Bell D, LaPadula L. MITRE Technical Report 2547 . 1973
[2]
A comparison of commercial and military computer security policies. D Clark, D Wilson. Proc of the IEEE Symposium on Security and Privacy . 1987
[3]
Role Based Access Control:Fratures and Motivations. D.F.Ferraiolo,J.Cugini,D.R.Kuhn. Coputer Security Applications Conference . 1995
[4]
Role-based AccessControl Models. Sandhu S. Coyne E J. Feinstein H L, et al. IEEE Computer . 1996
[5]
Integrity Considerations for Secure Computer Systems. Biba K. Technical Report MTR-3153 the MITRE Corporation . 1975