[1] BREWER D F C, NASH M J. The Chinese Wall security policy[C]//Proceedings of the 1989 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 1989:206-214. [2] LIN T Y. Chinese Wall security policy-an aggressive model[C]//Proceedings of the 1989 Fifth Annual Computer Security Applications Conference. Piscataway, NJ:IEEE, 1990:286-293. [3] WU R, AHN G-J, HU H, et al. Information flow control in cloud computing[C]//Proceedings of the 20106th International Conference on Collaborative Computing:Networking, Applications and Worksharing. Piscataway, NJ:IEEE, 2010:1-7. [4] ALQAHTANI S M, GAMBLE R, RAY I. Auditing requirements for implementing the Chinese Wall model in the service cloud[C]//SERVICES'13:Proceedings of the 2013 IEEE Ninth World Congress on Services. Washington, DC:IEEE Computer Society, 2013:298-305. [5] FEHIS S, NOUALI O, KECHADI T. A new Chinese Wall security policy model based on the subject's wall and object's wall[C]//ICACC 2015:Proceedings of the 2015 International Conference on Anti-Cybercrime. Piscataway, NJ:IEEE, 2015:1-6. [6] FEHIS S, NOUALI O, KECHADI M-T. A new distributed Chinese Wall security policy model[J]. Journal of Digital Forensics, Security and Law, 2016, 11(4):Article 11. [7] HUTTER D, VOLKAMER M. Information flow control to secure dynamic Web service composition[C]//SPC 2006:Proceedings of the 2006 International Conference on Security in Pervasive Computing, LNCS 3934. Berlin:Springer, 2006:196-210. [8] SHE W, YEN I-L, THURAISINGHAM B, et al. The SCIFC model for information flow control in Web service composition[C]//ICWS'09:Proceedings of the 2009 IEEE International Conference on Web Services. Piscataway, NJ:IEEE, 2009:1-8. [9] SHE W, YEN I-L, THURAISINGHAM B, et al. Rule-based run-time information flow control in service cloud[C]//ICWS 2011:Proceedings of the 201120th IEEE International Conference on Web Services. Washington, DC:IEEE Computer Society, 2011:524-531. [10] YU B, YANG L, CHEN S, et al. An information flow control approach in composite services[C]//IETICT 2013:Proceedings of the 2013 IET International Conference on Information and Communications Technologies.[S.l.]:IET, 2013:263-269. [11] XI N, SUN C, MA J, et al. Secure service composition with information flow control in service clouds[J]. Future Generation Computer Systems, 2015, 49:142-148. [12] SOLANKI N, HOFFMAN T, YEN I-L, et al. An access and information flow control paradigm for secure information sharing in service-based systems[C]//COMPSAC 2015:Proceedings of the 2015 IEEE 39th Computer Software and Applications Conference. Washington, DC:IEEE Computer Society, 2015:60-67. [13] XI N, SUN C, MA J, et al. Distributed information flow verification for secure service composition in smart sensor network[J]. China Communications, 2016, 13(4):119-130. [14] 马俊,王志英,任江春,等. 一种实现数据主动泄漏防护的扩展中国墙模型[J].软件学报,2012, 23(3):677-687. (MA J, WANG Z Y, REN J C, et al. Extended Chinese Wall model for aggressive data leakage prevention[J]. Journal of Software, 2012, 23(3):677-687.) |