BLP-based information security model in secure operating system

被引:0
|
作者
Huang, Yimin
Wang, Weizhen
机构
[1] College of Computer Science, Zhejiang University, Hangzhou 310027, China
[2] School of Business, Nanjing University, Nanjing 210093, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:133 / 135
相关论文
共 50 条
  • [21] Information security in networkable Windows-based operating system devices: Challenges and solutions
    Oshri, Ilan
    Kotlarsky, Julia
    Hirsch, Corey
    COMPUTERS & SECURITY, 2007, 26 (02) : 177 - 182
  • [22] Digital Information Security Sharing System Based On Lineage Model
    Li, Tao
    Liang, YiWen
    Yang, He
    ISIP: 2009 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING, PROCEEDINGS, 2009, : 121 - +
  • [23] Evaluating the Network and Information System Security Based on SVM Model
    Yang, Shaomei
    Liu, Donglei
    Liu, Zhibin
    JOURNAL OF COMPUTERS, 2009, 4 (11) : 1145 - 1150
  • [24] Model of information system security based on SVRM and rough set
    Che, Cheng
    Tang, Shoulian
    Information, Management and Algorithms, Vol II, 2007, : 57 - 60
  • [25] An Information System Security Evaluation Model Based on AHP and GRAP
    Xu Cuihua
    Lin Jiajun
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 493 - 496
  • [26] A novel operating system on chip with information security support for embedded system
    Hu, Wei
    Chen, Tianzhou
    Shi, Qingsong
    Wang, Gang
    Zhang, Nan
    Ma, Jijun
    Lian, Yi
    Journal of Software, 2009, 4 (10) : 1053 - 1060
  • [27] An Application Security Model Based on Business Process in Information System
    Xu, Peng
    Chen, Meirong
    Feng, Lifang
    Wu, Guanfeng
    Ma, Fangli
    Wang, Danchen
    2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,
  • [28] Use of Security Patterns for Development of Secure Healthcare Information System
    Maher, Zulfikar Ahmed
    Sani, Nor Fazlida Mohd
    Din, Jamilah
    Jabar, Marzanah A.
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2016, 6 (06) : 1541 - 1547
  • [29] Implementation of audit in secure operating system based on CC
    Zhang, XF
    Sun, YF
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 198 - 201
  • [30] Research of Information System Security Risk Management based on Probability Model and Security Entropy
    Du, Jiawei
    Zhou, Ying
    Guo, Ronghua
    Zhang, Xing
    Suo, Guowei
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420