5Snyder.Formal Models of Capability-based Protection Systems[J].IEEE Transactions on Computers,1981,30(03):172-181.
6KANG Myong H,MOSKOWTTZ Ira S.A Pump for Rapid,Reliable,Secure Communication[C]∥RAVI Ganesan.Proceedings of the The 1st ACM Conference on Computer and Communications Security.Fairfax,Virginia,USA:ACM Press,1993:119-129.
7JONES Douglas W,BROWERSOX Tom C.Secure Data Export and Auditing Using Data Diodes[C]∥DAN S.Wallach Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop.CA,USA:USENIX Association Berkeley,2006:04-04.
8Bell D E,La’Padula L J.Secure Computer Systems:Mathematical foundations[R].Bedford,USA:Electronic Systems Division,Air Force System Command,Tech.Rep.:MTR-2547,1973.