Open Access
ITM Web Conf.
Volume 11, 2017
2017 International Conference on Information Science and Technology (IST 2017)
Article Number 01002
Number of page(s) 9
Section Session I: Computational Intelligence
Published online 23 May 2017
  1. Alves-Foss J, Oman P W, Taylor C, et al. The MILS architecture for high-assurance embedded systems.[J]. International Journal of Embedded Systems, 2006, 2(3/4):239–247. [CrossRef] [Google Scholar]
  2. W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, Jim Alves-Foss. The MILS Architecture for a Secure Global information Grid [J].The Journal of Defense Software Engineering, 2005(10):20–24. [Google Scholar]
  3. Anderson C. Docker[J]. IEEE Software, 2015, 32(3). [Google Scholar]
  4. Bell D E, Padula L J L. Secure Computer System: Unified Exposition and Multics Interpretation[J]. Secure Computer System Unified Exposition & Multics Interpretation, 1976:161–161. [Google Scholar]
  5. Biba K J. Integrity Considerations for Secure Computer Systems[J]. Electronic Systems Div Air Force Hanscom Afb, 1977. [Google Scholar]
  6. Clark D D, Wilson D R. A Comparison of Commercial and Military Computer Security Policies[C]// IEEE Symposium on Security & Privacy. IEEE, 1987:184–184. [Google Scholar]
  7. Rushby J M. Design and verification of secure systems[M]// ACM SIGOPS Operating Systems Review. 2010:12–21. [Google Scholar]
  8. Rushby J M. Proof of separability A verification technique for a class of security kernels[M]// International Symposium on Programming. 1970:352–367. [Google Scholar]
  9. Wikipedia editor. MSL. Available from: [Google Scholar]
  10. Xiong Jinbo, et al. Action-Based Multilevel Access Control for Structured Document [J]. Journal of Computer Research and Development, 2013, 50(7):1399–1408. [Google Scholar]
  11. Cheng Jing, Shi Yong. Study on Multilevel Security Mechanism based on Virtualization[J]. Communications Technology, 2013(1):35–39. [Google Scholar]
  12. Chen Qingzhang. Characteristics of transparent environment[J]. Application Research of Computers, 1990(5):18–19. [Google Scholar]
  13. Jurca R, Faltings B. Eliciting Truthful Feedback for Binary Reputation Mechanisms[C]// Ieee/wic/acm International Conference on Web Intelligence. IEEE Computer Society, 2004:214–220. [Google Scholar]
  14. Kelly J C, Lead T, Kemp K, et al. formal methods specification and verification guidebook for software and computer systems volume i: planning and technology insertion[J]. 1998. [Google Scholar]
  15. Anderson J P, Anderson J P. Computer Security Technology Planning Study. Volume 2[J]. Computer Security Technology Planning Study, 1972. [CrossRef] [Google Scholar]
  16. Group T. TCG specification architecture overview. TCG Specification Revision. 2007;1:1–24. [Google Scholar]
  17. Quigley D, Sipek J, Wright C P, et al. Unionfs: User and Community-Oriented Development of a Unification File System[J]. Proceedings of the Linux Symposium, 2006:349––362. [Google Scholar]
  18. Rushby J. Noninterference, Transitivity, and Channel-Control Security Policies[J]. 1992. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.