Citation: | XUE Haiwei, ZHANG Yunliang, GUO Zhien, et al., “A Multilevel Security Model for Private Cloud,” Chinese Journal of Electronics, vol. 23, no. 2, pp. 232-235, 2014, |
R. Richardson, "2010/2011 computer crime and security survey", Computer Security Institute, pp.1-42, 2011.
|
P. Watson, "A multi-level security model for partitioning workflows over federated clouds", Journal of Cloud Computing, Vol.1, No.1, pp.1-15, 2012.
|
J.C. Mace, Van Moorsel A., P. Watson, "The case for dynamic security solutions in public cloud workflow deployments", IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, China, pp.111-116, 2011.
|
D.E. Bell, L.J. LaPadula, "Secure Computer Systems: Mathematical Foundations[R]", USA: MITRE CORP BEDFORD MA, 1973.
|
D.E. Bell, "Looking Back at the Bell-LaPadula Model", Proceedings of the Annual Computer Security Applications Conference, Tucson, Arizona, USA, pp.337-351, 2005.
|
Si Tiange, Zhang Raoxue, Dai Yiqi, "L-BLP security model in local area network", Acta Electronica Sinica, Vol.35, No.5, pp.1005-1008, 2007.
|
Haiwei Xue, Xiong Liu, Yiqi Dai, "A privacy protection model on internal networks", Proc. of 13th IEEE Joint International Computer Science and Information Technology Conference, Chongqing, China, pp.1-5, 2011.
|