共 50 条
- [1] Design and Implementation of Linux File Mandatory Access Control [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 15 - +
- [2] Enforce mandatory access control policy on XML documents [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 336 - 349
- [3] Checking Policy Enforcement in an Access Control Aspect Model [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2008, 11 (05): : 541 - 552
- [4] Access Control for Database Applications: Beyond Policy Enforcement [J]. PROCEEDINGS OF THE 19TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, HOTOS 2023, 2023, : 223 - 230
- [5] Analysis of access control enforcement in android [J]. Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, 2020, : 117 - 118
- [6] Analysis of Access Control Enforcement in Android [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 117 - 118
- [7] A mandatory access control policy model for information security requirements [J]. PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538
- [8] Security analysis of Mandatory Access Control Model [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5013 - 5018
- [9] Access Control Policy Enforcement for Zero-Trust-Networking [J]. 2018 29TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2018,
- [10] Separating access control policy, enforcement, and functionality in extensible systems [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2001, 19 (01): : 36 - 70