[1] 童伟传. 大数据时代面临的信息安全机遇和挑战[J]. 中国新通信, 2016, 18(16): 29. (Tong Weichuan.Opportunity and Challenge Faced by the Era of Big Data Information Security[J]. China's New Communications, 2016, 18(16): 29.) [2] Handschuh H, Trichina E.Securing Flash Technology: How Does It Look From Inside?[M]// ISSE 2008 Securing Electronic Business Processes. Vieweg Teubner, Germany: Springer, Berlin, 2009: 380-389. [3] 万焱. 对防火墙安全技术的剖析[J]. 湖北函授大学学报, 2016, 29(8): 125-126. (Wan Yan.Analysis of Firewall Security Technology[J]. Journal of Hubei Correspondence University, 2016, 29(8): 125-126.) [4] SF Sun, L Chen, D Gu, et al. Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations[J]. International Journal of Distributed Sensor Networks (S1550-1329), 2015: 1-15. [5] S M Jo, K Y Chung.Design of Access Control System for Telemedicine Secure XML Documents[J]. Multimedia Tools & Application (S1380-7501), 2015, 74(7): 2257-2271. [6] Fu X, Wu Z.Ciphertext Policy Attribute Based Encryption with Immediate Attribute Revocation for Fine-grained Access Control in Cloud Storage[C]// International Conference on Communications, Circuits and Systems. USA: IEEE, 2013: 103-108. [7] Tu Shanshan, Y Huang. Towards Efficient and Secure Access Control System for Mobile Cloud Computing[J]. Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications (S1671-5799), 2015, 12(12): 43-52. [8] Xinfeng Ye.Privacy Preserving and Delegated Access Control for Cloud Applications[J]. Tsinghua Science & Technology (S2096-0654), 2016, 21(1): 40-54. [9] Lee S H, Kwak J, Lee I Y.The Study on The Security Solutions of USB Memory[C]// Ubiquitous Information Technologies & Applications, 2009. ICUT '09. Proceedings of the 4th International Conference on,. Fukuoka Japan. USA: IEEE, 2009: 1-4. [10] Kyungroul Lee, Hyeungjun Yeuk, Youngtae Choi, et al.Safe Authentication Protocol for Secure USB Memories[J]. Security and Communication Networks (S1939-0114), 2012, 5(8): 834-834. [11] Fuw-Yi Yang, Tzung-DaWu, Su-Hui Chiu. A Secure Control Protocol for USB Mass Storage Devices[J]. IEEE Transactions on Consumer Electronics (S0098-3063), 2010, 56(4): 2239-2343. [12] Hanjae Jeong, Younsung Choi, Woongryel Jeon, et al.Vulnerability Analysis of Secure USB Flash Drives[C]// International Workshop on Memory Technology, Design and Testing. USA: IEEE, 2007: 61-64. [13] 郎园园. 三级等级保护信息系统建设方案的设计 [D]. 郑州: 郑州大学, 2013. (Lang Yuanyuan.Tertiary Level Protection Information System Construction Scheme Design [D]. Zhengzhou, China: Zhengzhou University, 2013. [14] 刘太洪. 大秦公司信息系统安全等级保护技术规划设计 [D]. 天津: 河北工业大学, 2014. (Liu Taihong.Daqin Company Information System Security Level Protection Technology Planning and Design [D]. Tianjin, China: Hebei University of Technology, 2014.) [15] 曹利锋. 面向多级安全的网络安全通信模型及其关键技术研究 [D]. 郑州: 解放军信息工程大学, 2013. (Cao Lifeng.Oriented to Multi-level Security Network Security Communication Model and Key Technology Research [D]. Zhengzhou, China: PLA Information Engineering University, 2013.) [16] 刘江. 多级跨域访问控制管理相关技术研究 [D]. 郑州: 解放军信息工程大学, 2013. (Liu Jiang.Multistage Cross-domain Access Control Management Related Technology Research [D]. Zhengzhou, China: PLA Information Engineering University, 2013.) [17] 张学思, 郁滨. 一种基于移动存储设备的多密级安全交互模型[J]. 系统仿真学报, 2015, 27(4): 755-761. (Zhang Xuesi, Yu Bin.A Security Multi-level Interaction Model Based on Porable Storage Device[J]. Journal of System Simulation (S1004-731X), 2015, 27(4) : 755-761.) |