您当前的位置:
首页 >
文章列表页 >
Research of duality and multi-level security model based on intransitive noninterference theory
更新时间:2024-10-14
    • Research of duality and multi-level security model based on intransitive noninterference theory

    • Vol. 30, Issue 2, Pages: 52-58(2009)
    • CLC: TP309
    • Published:2009

    移动端阅览

  • LIU Wei-peng1, ZHANG Xing2. Research of duality and multi-level security model based on intransitive noninterference theory[J]. 2009, 30(2): 52-58. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

773

下载量

8

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Access control security model based on behavior in cloud computing environment
Access control model based on trusted computing for integrated avionics system
Secret level valuation method of BLP model based on some application properties
Reconstruction of BLP model based on secure subject access
Study on enhancing integrity for BLP model

Related Author

Shan HE
Hao HUANG
Ji-yi WU
Wei CHEN
Guo-yuan LIN
MA Jian-feng1
CUI Xi-ning1
2

Related Institution

School of Computer,China University of Mining and Technology
Department of Computer,Nanjing University
Hangzhou Normal University,Key Lab of E-Business and Information Security
School of Computer Science and Technology,Xidian University
Aeronautics Computing Technology Research Institute
0