[1] DoD 5200.28-STD,Department of Defense Standard.Department of Defense Trusted Computer System Evaluation Criteri a.National Computer Security Center,Ft.Meade,MD,USA,1985.[2] China State Bureau of Quality and Techni cal Supervision.National Criteria of People's Republi c of China:Classified criteria for security protection of Computer information system.GB 17859-1999,1999(in Chinese).[3] The International Organization for Standardization.Common Criteria for Information Technology Security Evaluation.ISO IEC 15408:1999(E),1999.[4] Liu HF,Qing SH,LiuWQ.Design and realization of auditing in secure OS.Journal of Computer Research &Development,2001,38(10):1262~1268 (in Chinese with Engli sh abstract).[5] Zhao ZK,Qing SH,Li LP.Research on the security architecture supporting dynamic and multiple security polici es.Computer Engineering,2004,30(3):63~66(in Chinese with English abstract).[6] Qing SH,Liu WQ,Wen HZ.Operating System Security.Beijing:Tsinghua University Press,2004(in Chinese).[7] Qing SH,Zhu JF.Covet channel analysis on ANSHENG secure operating system.Journal of Software,2004,15(9):1385~1392(in Chinese with Engli sh abstract). |