1[2]J Anderson.Information Security in a multi-user computer environment[J].Advances in Computers,1973,(12):1-35
2[3]G Stoneburger.Information system security engineering principles-initial draft outline[OL].http://csrc.nist.gov/publications/drafts/issep-071800.doc,2000
3[4]D E Bell,L J LaPadula.Secure computer systems:Mathematical foundations[R].MITRE Corporation,Tech Rep:MTR-2547,1973
4[5]D E Bell,L J LaPadula.Secure computer system:Unified exposition and multics interpretation[R].MITRE Corporation,Tech Rep:MTR-2997,1976
5[8]M Atallah,M Blanton,N Fazio,et al.Dynamic and efficient key management for access hierarchies[C].CCS'05,Alexandria,Virginia,USA,2005
6[9]R Sandhu.Engineering authority and trust in cyberspace:The OM-AM and RBAC way[C].In:Proc of the 5th ACM Workshop on Role-Based Access Control (RBAC-00).New York:ACM Press,2000.111-119
7[10]A Shamir.Identity-based cryptosystems and signature schemes[C].In:Proc of CRYPTO'84.Berlin:Springer-Verlag,1985.47-53
8[12]D Boneh,M Franklin.Identity-based encryption from the Weil pairings[C].In:Advances in Cryptology-Crypto 2001.Berlin:Springer-Verlag,2001.213-229
9[13]TCG Group.TPM Main Specification,Version 1.2[OL].http://www.trustedcomputinggroup.org,2003