3BELL D E,LAPADULA L J.Secure computer system:mathematical foundation and model[R].Mitre Corp,Bedford Massachussetts:Technical Report,1973:74~244
4K J Biba.Integrity Considerations for Secure Computer Systems[R].Technical Report ESD-TR-76-372,USAF Electronic Systems Division,Hanscom Air Force Base,Bedford,Massachusetts,1977
5Karger P A,V R Austel,D C Toll.Using Mandatory Secrecy and Integrity for Business to Business Applications on Mobile Devices[J].IBM Research,2000
6T Fraser.LOMAC:Low Water-Mark Integrity Protection for COTS Environments[C].In:Proceedings of the 2000 IEEE Symposium on Security and Privacy,Oakland,California,USA,2000
7David Safford,Mimi Zohar.A Trusted Linux Client(TLC).http://www.research.ibm.com/gsal/tcpa/tlc.pdf
8J Marchesini,S Smith,O Wild.Experimenting with TCPA/TCG Hardware,Or:How I Learned to Stop Worrying and Love The Bear[R].Computer Science Technical Report TR2003-476,Dartmouth College,2003
9Qiang Huang,Changxiang Shen.A new MLS mandatory policy combining secrecy and integrity implemented in highly classified secure level OS Signal Processing[C].In:Proceedings ICSP'04,2004 7th International Conference,2004; 3:2409