1QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China,2 School of Software and Microelectronics, Peking University, Beijing 102600, China,3 Institute of Computing Technology, Navy, Beijing 100841, China.Design of secure operating systems with high security levels[J].Science in China(Series F),2007,50(3):399-418. 被引量:5
6D. Ferraiolo, J. Cugini, D. R. Kuhn. Role based access control(RBAC): Features and motivations. In: Proc.11th Annual Computer Security Applications Conf. Los Alamitos: IEEE Computer Society Press, 1995. 241-248.
7J. Hoffman. Implementing RBAC on a type enforced system. In:Proc. 13th Annual Computer Security Applications Conf. Los Alamitos: IEEE Computer Society Press, 1997. 158- 163.
8Ramaswamy Chandramouli. A framework for multiple authorization types in a heahhcare application system. In: Proc.17th Annual Computer Security Applications Conf. Los Alamitos:IEEE Computer Society Press, 2001. 137-148.
9Oingfeng He. Privacy enforcement with an extended role-based accesscontrol model. Department of Computer Science, North Carolina State University, USA, Tech. Rep.: TR-2003-09,2003.
9ZHONG An-ming 1, JIA Chun-fu 1,21.College of Information Technology and Sciences, Nankai University, Tianjin 300071,China,2.State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Science, Beijing 100039,China.Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-MarkovModel[J].Wuhan University Journal of Natural Sciences,2005,10(1):137-141. 被引量:2