[1] Rivest R L, Adleman L M, Dertouzos M. on Data Banks and Privacy Homomorphisms[J]. In Foundations of Secure Computation, 1978,21(2):169-178. [2] 刘明坤. 基于密态数据库操作的秘密同态算法研究[D]. 贵阳:贵州大学,2006. [3] 牟亚莉, 曾浩, 刘欣. 多级安全数据库体系结构及其策略模型的研究[J]. 海军工程大学学报,2006,18(2):9-13. [4] Bell D E, La Padula. Secure Computer Systems: Mathematical Foundations and Model (Technical Report,MTR-2547) [M]. Bedford, MA: Mitre Corporation, 1973. [5] Biba K J. Integrity Considerations for Secure Computer Systems (Technical Report MTR-3153) [M]. Bedford, MA: Mitre Corporation, 1977. [6] Denning D E, Lunt T F. The Seaview security model [J]. Software Engineering, IEEE Transactions, 1990, 16(6):593-607. [7] Min-Shiang Hwang, Wei-Pang Yang. Multilevel secure database encryption with subkeys[J]. Data & Knowledge Engineering,1997,(22):117-131.