[1] Bell D E, LaPadula L J. Secure computer system: unified exposition and multics interpretation. Bedford: MITRE Corporation,1976. [2] 范艳芳,韩臻,曹香港,等.基于时间限制的多级安全模型[J].计算机研究与发展,2010,47(3):508-514. Fan Yanfang,Han Zhen, Cao Xianggang, et al. A multilevel security model based on time limit[J]. Journal of Computer Research and Development, 2010, 47(3): 508-514. [3] Sandhu R, Coyne E J, Feinstein H L, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2):38-47. [4] Kumar M, Newman R. Strbacan approach towards spatio-temporal role-based access control//Proceedings of the Third IASTED International Conference on Communication. Network: Information Security, 2006:150-155. [5] Ray I, Kumar M, Yu L. LRBAC: a location-aware role-based access control model//Proceedings of the 2nd International Conference on Information Systems Security. Kolkata, India: Lecture Notes in Computer Science, 2006: 147-161. [6] Bauer M, Becker C, Rothermel K. Location models from the perspective of context-aware applications and mobile Ad Hoc Networks[J]. Personal and Ubiquitous Computing, 2002(6): 322-328. [7] Ray I, Kumar M. Towards a location-based mandatory access control model[J]. Computers & Security, 2006, 25(1): 36-44. |