[1]Popa L C, Yu M L, Steven Y K, et al. CloudPolice: Taking access control out of the network [C] ∥ Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks. New York: ACM, 2010: 16.[2]姚立红, 訾小超, 潘理, 等. 基于带标签有限自动机的隐蔽存储通道搜索[J]. 上海交通大学学报, 2008, 42(10): 16461649.YAO Lihong, ZI Xiaochao, PAN Li, et al. Covert storage channel identification based on labeled finite automaton[J]. Journal of Shanghai Jiaotong University, 2008, 42(10): 16461649.[3]LaPadula L J. Secure computer systems: A mathematical model. [EB/OL]. [20110622]. http://spy.sci.univr.it/papers/Isa/Sicurezza/NonInterferenza/secure_comp.pdf.[4]Weng Chuliang, Luo Yuan, Li Minglu, et al. A BLPbased access control mechanism for the virtual machine system [C] ∥ The 9th International Conference for Young Computer Scientists. Hunan: IEEE, 2008: 22782282.[5]Landwehr C E, Heitmeyer C L, McLean J. A security model for military message systems [J]. ACM Transactions on Computer Systems, 1984, 2(3): 198222.[6]Ou Wei, Wang Xiaofeng, Han Wenbao, et al. Research on trusted network model based on BLP model [C] ∥ Fourth International Conference on Computer Sciences and Convergence Information Technology. Seoul, Korea: IEEE, 2009: 11371142.[7]Gehres P, Singleton N, Louthan G, et al. Toward sensitive information redaction in a collaborative, multilevel security environment [C] ∥ Proceedings of the 6th International Symposium on Wikis and Open Collaboration. New York: ACM, 2010.[8]Wright C, Cowan C, Smalley S, et al. Linux security modules: General security support for the linux kernel [C]∥Proceedings of the 11th USENIX Security Symposium. California, USA: USENIX, 2002: 1731.[9]Blanc M, Clemente P, Kissi S W. Toward a real MLS/SELinux system for end users: An empirical study [C]∥International Symposium on Collaborative Technologies and Systems. Baltimore, USA: IEEE, 2009: 209216.[10]Bode S, Fischer A, Kuhnhauser W, et al. Software architectural design meets security engineering [C]∥16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems. San Francisco, USA: IEEE, 2009: 109118. |