[1] Sandhu R, Coyne E J, Feinstein H L, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38-47. [2] Brewer D, Nash M. The Chinese-Wall security policy//Proceedings of the 1989 IEEE Symposium on Security and Privacy.Oakland:IEEE Computer Society, 1989:206-214. [3] 雷新锋, 梁明晓, 刘军, 等. 一种开放的综合安全模型[J]. 北京邮电大学学报, 2008, 31(1): 18-21. Lei Xinfeng, Liang Mingxiao, Liu Jun, et al. An open synthetical security model[J]. Journal of Beijing University of Posts and Telecommunication, 2008, 31(1): 18-21. [4] 秦超, 陈钟, 段云所. Chinese-Wall策略及其在多级安全环境中的扩展. 北京大学学报(自然科学版), 2002, 38(3): 369-374. Qin Chao, Chen Zhong, Duan Yunsuo. Chinese-Wall policy and its extension in multilevel security system[J]. Acta Scientiarum Naturalium Universitatis Pekinensis, 2002, 38(3): 369-374. [5] 何永忠, 李晓峰, 冯登国. RBAC实施中国墙策略及其变种的研究[J]. 计算机研究与发展, 2007, 44(4): 615-622. He Yongzhong, Li Xiaofeng, Feng Dengguo. Implementing Chinese Wall policies on RBAC[J]. Journal of Computer Research and Development, 2007, 44(4): 615-622. |