海词手机词典
  • This article reconstructs the military BLP models using the role-based access control model without varying the security mark of original system, and offers its proof, thus building a new access control model.

    播放读音 播放读音