期刊文献+

生产信息系统的多级安全策略模型 被引量:1

A Multi-Layer Security Policy Model of Engineering Information Systems
下载PDF
导出
摘要 生产信息系统是一类对安全要求较高,有明确安全目标,专为工程应用定制的信息系统.它有明确的边界环境,相对固定的应用流程和用户角色以及大量的先验安全知识.为了开发安全的生产信息系统,首先必须建立系统的安全模型.提出的生产信息系统的多级安全策略模型,在遵守最小特权的原则下,将主客体安全属性、操作请求、安全策略和行为环境综合考虑,引入完整性检查引擎和保密性检查引擎,将主体从授权可信过渡到行为可信.其实现思路对于安全生产信息系统的建立提供了很好的参考价值.
作者 赵佳 韩臻
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期589-593,共5页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展规划基金项目(TG1999035801) 国家"八六三"高技术研究发展计划基金项目(2002AA1Z2101)
  • 相关文献

参考文献12

  • 1[1]Department of Defense,USA.DOD 5200.28-STD.DOD Trusted Computer Security System Evaluation Criteria.1985
  • 2[2]J P Anderson.ESD-TR-73-51.Computer security technology planning study.Vol I.Bedford,MA,USA:Electronic Systems Division,Air Force Systems Command,Hanscom Air Force Base,1972
  • 3周伟,尹青,王清贤.计算机安全中的经典模型[J].计算机科学,2004,31(3):195-200. 被引量:5
  • 4[4]D E Bell,L J LaPadula.Secure computer system.Mitre Corporation,Tech Rep:MTR-2547,1973
  • 5[5]D D Clark,D R Wilson.A comparison of commercial and military computer security policity.IEEE Symp on Security and Privacy,Oakland,CA,1987
  • 6[6]K J Biba.Integrity considerations for secure computer systems.The Mitre Corporation,Tech Rep:MTR 3153,1977
  • 7[7]R S Sandhu,et al.Role-based access control models.IEEE Computer,1996,29(2):38-47
  • 8邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 9[9]David F C Brewer,Michael J Nash.The Chinese Wall security policy.IEEE Symp on Security and Privacy,Oakland,California,USA,1989
  • 10[10]Neil A Waldhart.The army secure operating system.1990 IEEE Computer Society Symp on Research in Security and Privacy,Oakland,California,USA,1990

二级参考文献25

  • 1Denning D E. A Lattice Model of Secure Information Flow.Communications of the ACM, 1976,19(5): 236-243
  • 2Department of Defense: DOD Trusted Computer Security System Evaluation Criteria (The Orange Book),DOD 5200.28-STD, 1985
  • 3Goguen J A, Meseguer J. Security policies and security models.In: Proc. of the 1982 IEEE Symposium on Security and Privacy,IEEE Computer Society Press,April,1982.11-20
  • 4Goguen J A,Meseguer J. Unwinding and Inference Control. In:Proc. of the 1984 IEEE Symposium on Security and Privacy ,IEEE Computer Society Press ,May 1984. 75-86
  • 5Harrison M A,Ruzzo W L, Ullman J D. Protection in Operating Systems Communications of the ACM, 1976,19(8):461-471
  • 6Lampson B W. Protection. ACM Operating Systems Reviews,1974,8(1):18-24
  • 7Lampson B W. A Note on the Confinement Problem. Communications of the ACM,1973,16(10):613-615
  • 8Landwehr C B. Formal Models for Computer Security. ACMComputing Surveys, 1981,13(3): 247-278
  • 9McLean J. A Comment on the ‘Basic Security Theorem' of Belland LaPadula. Information Processing Letters, 1985,20(2):67 -70
  • 10McLean J. Security models. in the Encyclopedia of Software Engineering (ed. John Marciniak) ,Wiley & Sons,Inc. ,1994

共引文献252

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部