期刊文献+

基于行为的云计算访问控制安全模型 被引量:69

Access control security model based on behavior in cloud computing environment
下载PDF
导出
摘要 针对当前流行的云计算技术,分析了其所面临的安全问题。以BLP(Bell-LaPadula)模型和Biba模型为参考,通过基于行为的访问控制技术来动态调节主体的访问范围,实现BLP模型和Biba模型的有机结合,提出了CCACSM(cloud computing access control security model)。该模型不仅能保护云端服务器中数据完整性和保密性,而且使云计算环境具有相当的灵活性和实用性。最后给出了该模型的组成部分、安全公理和实现过程。 In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM(cloud computing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.
出处 《通信学报》 EI CSCD 北大核心 2012年第3期59-66,共8页 Journal on Communications
基金 国家自然科学基金资助项目(51104157) 中国博士后科学基金资助项目(20100481181) 教育部博士学科点专项科研基金资助项目(20110095120008)~~
关键词 云计算 BLP模型 BIBA模型 基于行为的访问控制 cloud computing BLP model Biba model access control based on behavior
  • 相关文献

参考文献13

  • 1MILLER M.Cloud Computing:Web-Based Applications ThatChange the Way You Work and Collaborate Online[M].Que PrintPublication,2008.
  • 2冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 3SIRISHA A,GEETHAKUMARI G.API access control in cloud usingthe role based access control model[A].Trendz in Information Sci-ences and Computing-TISC2010[C].2010.
  • 4LI D,LIU C,WEI Q,et al.RBAC-Based access control for SaaSsystems[A].2010 2nd International Conference on Information Engi-neering and Computer Science(ICIECS)[C].2010.
  • 5XUE J,ZHANG J J.A brief survey on the security model of cloudcomputing[A].2010 Ninth International Symposium on DistributedComputing and Applications to Business Engineering and Science(DCABES)[C].2010.
  • 6Nat’l Computer Security Center.Trusted network interpretation of thetrusted computer system evaluation criteria[A].NCSC-TG2005[C].1987.
  • 7BELL D E,LAPADULA L J.Secure Computer Systems:Mathemati-cal Foundations[R].The MITRE Corporation,Bedford,Massachus-setts,1973.
  • 8LIN T,BELL Y,AXIOMS L.A“new”paradigm for an“old”model[A].Proc 1992 ACM SIGSAC New Security Paradigms Work-shop[C].1992.
  • 9BIBA K J.Integrity Considerations for Secure Computer Systems[R].Bedford:ESD-TR-76-732,1977.
  • 10李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20

二级参考文献69

共引文献1161

同被引文献519

引证文献69

二级引证文献534

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部