4Sandhu R.Access control:the neglected frontier[C]//Proc First Australasian Conference on Information Security and Privacy,Wollongong,Australia,June 23-26,1996.
5Bell D E,La Padula L J.Secure computer system:unified exposition and multics interpretation,MTR-2997[R].Bedford,MITRE Corporation,1976.
6Bell D E,La Padula L J.Secure computer systems:mathematical foundations.ESD-TR-73-278,Vol Ⅰ,AD 770 768,Electronic Systems Division,Air Force Systems Command,Hanscom AFB,Bedford,Massachusetts,November 1973.
7Watson R,Feldman B,Migus A,et al.Design and implementation of the trusted BSD MAC framework[C]//Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX'03),2003.
8Juan-Mariano de Goyeneche Elena Apolinario Fernández de Sousa.Loadable Kernel Modules.Technical University of Madrid January/February 1999 IEEE Software.