BLP-based information security model in secure operating system

被引:0
|
作者
Huang, Yimin
Wang, Weizhen
机构
[1] College of Computer Science, Zhejiang University, Hangzhou 310027, China
[2] School of Business, Nanjing University, Nanjing 210093, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:133 / 135
相关论文
共 50 条
  • [31] The Secure Authorization Model for Healthcare Information System
    Hsu, Wen-Shin
    Pan, Jiann-I
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [32] The Secure Authorization Model for Healthcare Information System
    Wen-Shin Hsu
    Jiann-I Pan
    Journal of Medical Systems, 2013, 37
  • [33] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [34] Lattice based BLP Extended Model
    Shen Ying
    Xiong Lirong
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 309 - 312
  • [35] A compositional multiple policies operating system security model
    Xia, Lei
    Huang, Wei
    Huang, Hao
    INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 291 - 302
  • [36] Privacy of Patient Information Implementation and Security Analysis of a Secure Three Tier Patient Information System based on QR Code
    Panwar, Narendra
    Rauthan, Manmohan Singh
    Agarwal, Amit
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 232 - 234
  • [37] Matrix correction method based information system security assessment model
    Yang H.
    Zhang X.
    Lu W.
    1600, Tsinghua University (60): : 393 - 401
  • [38] XML security model for secure information exchange in E-Commerce
    Cho, Kwang Moon
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 1003 - 1011
  • [39] Design of secure operating system
    Mao, Weifeng
    Ping, Lingdi
    Jiang, Li
    Chen, Xiaoping
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (12): : 179 - 181
  • [40] Dedicated secure operating system
    Shi, Jun
    Zhu, Lu-Hua
    Shen, Chang-Xiang
    You, Jin-Yuan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (05):