[1] |
ZHANG Boju, ZHU Guangjie. Research on Security Assurance System of Railway Critical Information Infrastructure[J]. Railroad Computer Application, 2022, 31(11): 1-5.
|
|
张伯驹, 朱广劼. 铁路关键信息基础设施安全保障体系研究[J]. 铁路计算机应用, 2022, 31(11):1-5.
|
[2] |
XUE Zhaohui, XIANG Min. Research on Data Center Security Protection under Zero-Trust Security Model[J]. Communication Technology, 2017, 50(6): 1290-1294.
|
|
薛朝晖, 向敏. 零信任安全模型下的数据中心安全防护研究[J]. 通信技术, 2017, 50(6):1290-1294.
|
[3] |
LI Fenghua, SU Mang, SHI Guozhen, et al. Research Progress and Development Trend of Access Control Modeling[J]. Journal of Electronics, 2012, 40(4): 805-813.
|
|
李凤华, 苏铓, 史国振, 等. 访问控制模型研究进展及发展趋势[J]. 电子学报, 2012, 40(4):805-813.
doi: 10.3969/j.issn.0372-2112.2012.04.030
|
[4] |
WEI Xingmin, HE Jiangmin. Discussion on Mandatory Access Control Technology in Information Security Level Protection Technology[J]. Electronic World, 2019, 8(8): 148-150.
|
|
魏兴民, 贺江敏. 信息安全等级保护技术之强制访问控制技术探讨[J]. 电子世界, 2019, 8(8):148-150.
|
[5] |
FENG Chaosheng, YU Keping, BASHIR A K, et al. Efficient and Secure Data Sharing for 5G Flying Drones: A Blockchain-Enabled Approach[J]. IEEE Network, 2021, 35(1): 130-137.
|
[6] |
CHEN Danhui, ZHANG Weijun, ZHOU Anran. Research on Host Security Protection Technology of Railroad Communication Network Based on Trusted Computing Environment[J]. Railway Communication Signal, 2022, 58(7): 74-78.
|
|
陈丹晖, 张卫军, 周安冉. 基于可信计算环境的铁路通信网络主机安全防护技术研究[J]. 铁道通信信号, 2022, 58(7):74-78.
|
[7] |
ZHANG Xinwen, COVINGTON M J, CHEN Songqing, et al. SecureBus: Towards Application-Transparent Trusted Computing with Mandatory Access Control[C]// ACM. 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2007: 117-126.
|
[8] |
ROSSI M, FACCHINETTI D, BACIS E, et al. {SEApp}: Bringing Mandatory Access Control to Android APPs[C]// USENIX. 30th USENIX Security Symposium(USENIX Security 21). New York: USENIX, 2021: 3613-3630.
|
[9] |
DING Yan, WANG Peng, WANG Chuang, et al. Attribute-Based Dynamic Mandatory Access Control Mechanism for Operating Systems[J]. Computer Engineering and Science, 2023, 45(10): 1770-1778.
|
|
丁滟, 王鹏, 王闯, 等. 基于属性的操作系统动态强制访问控制机制[J]. 计算机工程与科学, 2023, 45(10):1770-1778.
|
[10] |
LIU Haidong, GUO Songhui, SUN Lei, et al. Trusted Computing Architecture for Secure Network Functions[C]// IEEE. 2020 7th International Conference on Information Science and Control Engineering(ICISCE). New York: IEEE, 2020: 1478-1483.
|
[11] |
KANG Luyi, XUE Yuqi, JIA Weiwei, et al. Iceclave: A Trusted Execution Environment for in-Storage Computing[C]// IEEE. MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture. New York: IEEE, 2021: 199-211.
|
[12] |
FENG Dengguo, LIU Jingbin, QIN Yu, et al. Trustworthy Computing Theory and Technology in Innovative Development[J]. Chinese Science: Information Science, 2020, 50(8): 1127-1147.
|
|
冯登国, 刘敬彬, 秦宇, 等. 创新发展中的可信计算理论与技术[J]. 中国科学:信息科学, 2020, 50(8):1127-1147.
|
[13] |
SUO Xiangrong, QI Sheng, ZHANG Yuebin, et al. Research on Fine-Grained Access Control Scheme for Railroad Cloud Platform[J]. Railroad Computer Application, 2021, 30(4): 45-49.
|
|
锁向荣, 齐胜, 张悦斌, 等. 铁路云平台细粒度访问控制方案研究[J]. 铁路计算机应用, 2021, 30(4):45-49.
|