[1] Wang Yuanyuan, Cheng Jun, Zheng Yuelin.Design of organization administration model on workflow system [J].China Management Informationization, 2006, 9(12):5-7.(in Chinese)
[2] Bell D E, LaPadula L J.Secure computer systems:unified exposition and multics interpretation, ESD-TR-75-306[R].Bedford, MA, USA:The Mitre Corporation, 1976.
[3] Li Ruixuan, Zhao Zhanxi, Wang Zhigang, et al.A BLP model based on access history [J].Computer Science, 2006, 33(7):286-288.(in Chinese)
[4] Li Lan, He Yongzhong, Feng Dengguo.A fine-grained mandatory access control model for XML documents [J].Journal of Software, 2004, 15(10):1528-1537.(in Chinese)
[5] He Jianbo, Qing Sihan, Wang Chao.Analysis of two improved BLP models [J].Journal of Software, 2007, 18(6):1501-1509.(in Chinese)
[6] Verschuren J, Govaerts R, Vandewalle R.Realization of the Bell-LaPadula security policy in an OSI distributed system using asymmetric and symmetric cryptographic algorithms [C]//Proc of Computer Security Foundations Workshop.IEEE Computer Society Press, 1992:168-178.
[7] LaPadula L J.Foreword for republishing of the Bell-LaPadula model [J].Journal of Computer Security, 1996, 4(9):233-238.
[8] Focardi R, Martinelli F.A uniform approach for the definition of security properties [C]//Proc of World Congress on Formal Models.Springer, 1999, 1708:794-813.
[9] Liu Wenqing, Qing Sihan, Liu Haifeng.Design of a modified BLP security model and its application to secLinux [J].Journal of Software, 2004, 13(4):567-573.(in Chinese)
[10] Wang Guilin, Qing Sihan, Ni Xizhen, et al.The Bell-LaPadula formal model for secure computer systems [J].Computer Science, 2003, 12(7):89-92.(in Chinese)