1[1]L.harn,H.Y.Lin.A cryptographic keys generation scheme for multilevel data security [J].Computer security,1990,9:539-546.
2[2]Vincent Nicomette and Yves deswarte.A multilevel security model for distributed object systems [J].Proceedings in Computer Security,Esorics 96.
3[3]R.s.sandhu and P.samarati,Access control:principles and practies [J].IEEE communications,1994,32(9):40-48.
4[4]Takayuki Tachikawa,Hiroaki Higaki,Makoto Takizawa.Purpose-oriented access control model in object-based systems [A].In Proceedings ACISP′97 [C],1997,7:38-49.
5[5]G.Horng.A key management approach for access control in user hierarchies [J].Proc.Of International Computer symposium,Hsinchu,TaiWan,1994:439-444.
6[6]H.M.Tsai,C.C.Chang.A cryptogaryphic implementation for dynamic access control in a user hierarchy [J].compute and security,1995,14:159-166.
7[7]Chu-Hsing Lin.Dynamic key management schemes for access control in a hierarchy [J].Computer comminication,1997,20(15):1381-1385.
8[8]D.Bell and L.Lapadula.Secure computer systems:unified exposition and multics interpretation [R].Tech.Rep.MTR-2997,MITRE Co.,1975,7.