LIN Zhi LIU De-xiang LI Yun-shan KE Mei-yan. Research on security policy about state control[J]. Journal of Computer Applications, 2012, 32(05): 1375-1378.
[1]DAMIANOU N, DULAY N, LUPU E C, et al. The ponder policy specification language[C]// Proceedings of the International Workshop on Policies for Distributed Systems and Networks. London, UK: Springer-Verlag,2001:1-11.[2]LALANA K. Rei: A policy specification language[R/OL].[2011-09-21]. HP Labs. http://rei.umbc.edu/.[3]DELLA-LIBERA G, HALLAM-BAKER P. Web services security policy language. [EB/OL].[2011-08-04].http://en.wikipedia.org/wiki/ws-SecurityPolicy.[4]MOSES T. Extensible access control markup language (XACML) version 3.0[EB/OL].[2011-08-10].http://www.oasis-open.org/ committees/tc_home.php.[5]李星. 访问控制策略语言的研究与设计[D]. 合肥: 中国科学技术大学, 2009.[6]张清源. 基于RBAC的多域间策略合成机制研究与实现[D]. 上海: 上海交通大学, 2010.[7]IETF Policy Working Group. Policy framework[EB/OL].[2011-08-30].http://www.ietf.org/html.charters/policy-charter.html.[8]谷千军, 王越. BLP模型的安全性分析与研究[J]. 计算机工程,2006, 32(22):157-158.[9]刘光武. 自动机状态复杂度及模型研究[D]. 武汉: 华中科技大学, 2007.[10]陈晓苏, 匡硕, 吴永英, 等. 基于XML的安全策略描述语言规范[J].华中科技大学学报:自然科学版,2008,36(6):28-32.[11]WANG JING, LIN ZHI. An XML-based description method ofsecurity policy[C]// IEEE International Conference on Intelligent Computing and Intelligent Systems. Washington, DC: IEEE Computer Society,2010:391-396.[12]杜红燕, 潘怡, 黄彩霞, 等. OC-RBAC模型在管理信息系统中的应用[J].华中科技大学学报:自然科学版,2009,37(9):53-55.[13]安伟莲. RBAC模型在J2EE平台下的实现与应用[D]. 北京: 北京邮电大学, 2008.[14]LIN ZHI, WANG JING, JIA LIAN-XING. Policy-based behavior control[C]// International Conference on Wireless Communications, Networking and Mobile Computing. Washington, DC: IEEE Computer Society,2009:365-370.