3Denning D E.A lattice model of secure information flow[J],Commu ACM,1976,19 (5):236 ~ 243.
4Badger L,Sterne D F,Sherman D L,Walker K M,Haghighat S A.Practical Domain and Type Enforcement for Unix[A].Proceedings of the 1995 IEEE Symposium on Security and Privacy[C] Oakland:IEEE Computer Society Press,1995.66 -77.
5Sandhu R S,Coyne E J,Feinstein H L,Youman C E.Role-Based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
6Waldhart N A.The Army Secure Operating System[A].Proceedings of Research in Security and Privacy[C].Oakland:IEEE,1990.50-60.
7US DoD 5200.28-STD-1985, Trusted Computer System Evaluation Criteria (TCSEC) [S] .
8ISBN 92-826-3004-8-1991, Information Technology Se- curity Evaluation Criteria (ITSEC), Version 1.2 [S] .
9CCIMB-99-031-1999, Common Criteria for Information Technology Security Evaluation, Version 2.1 [S] .