2Marshall D. Abrams, and Michael V. Joyce. New thinking about information technology security [J ]. Computers & Security, 1995,14( 1 ) :69-81.
3Marshall D. Abrams, mad Michael V. Joyce. Trusted computing update[J]. Computers & Security, 1995,14( 1 ) :57 - 68.
4Marshall D. Abrams, and Michael V. Joyce. Trusted system concepts[J]. Computers & Security, 1995,14( 1 ) :45 - 56.
5Jonathan Moffett, Morris Sloman and Kevin Twidle. Specifying discretionary access control policy for distributed systems [ J ]. Computer Communications, 1990,13(9) :571 - 580.
6Tatyana Ryutov and Clifford Neuman. Representation and Evaluation of Security Policies for Distributed System Services[ A]. DARPA Information Survivability Conference and Exposition[ C]. Hilton Head Island,SC, USA: DISCE, 2000.
7C Bidan and V Issamy. Dealing wilh Multi-Pohcy Security in Large Open Distributed Systems[ A]. Proceedings of 5th European Symposium on Research in Computer Security [ C ]. Louvain-la-Neuve, Belgium: ESRCS, 1998.51 - 66.