1Michael E, Whitman. Principle of Information Seeurity[M].Second Edition.北京:清华大学出版社,2006:173-190.
2Muftic S, Sloman M. Security Architecture for Distributed Systems[J].Computer Communication,1994,17(7):492-500.
3Abowd G, Allen R. Formalizing Style to Understand Descriptions of Software Architecture[J].ACM Transactions on Software Engineering and Methodology, 1995,4(4):319-364.
4National Computer Center. Trusted Computer System Evaluation Criteria[R]. Technical Report DoD 5200.28-STD,1985.
5Paola Inverardi, Alexander L. Wolf. Formal Specification and Analysis of Software Architectures Using the Chemical Abstract Machine Model[J]. IEEE Transactions on Software Engineering,1995,21(4): 373-386.