您当前的位置:
首页 >
文章列表页 >
Reconstruction of BLP model based on secure subject access
更新时间:2024-10-14
    • Reconstruction of BLP model based on secure subject access

    • Issue 12, Pages: 25-32(2007)
    • CLC: TP393.08
    • Published:2007

    移动端阅览

  • LIU Ke-long1, DING Li2. Reconstruction of BLP model based on secure subject access[J]. 2007, (12): 25-32. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

734

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Secret level valuation method of BLP model based on some application properties
Access control security model based on behavior in cloud computing environment
Research of duality and multi-level security model based on intransitive noninterference theory
Access control model based on trusted computing for integrated avionics system
Study on enhancing integrity for BLP model

Related Author

Chan DONG
Xiu-bin FAN
You-wen LI
Jian-rong WANG
Shan HE
Hao HUANG
Ji-yi WU
Wei CHEN

Related Institution

School of Science,North University of China
Institute of Software,Chinese Academy of Sciences
School of Computer and Communication Engineering,University of Sciences and Technology Beijing
School of Computer,China University of Mining and Technology
Department of Computer,Nanjing University
0