期刊文献+

一种形式化的强制存取控制模型的研究与实现 被引量:2

Research and Implementation of a Formalized Method Based on Mandatory Access Control Model
下载PDF
导出
摘要 针对数据库管理系统DBMS中的自主访问控制模型存在的安全缺陷,提出了一种形式化的强制存取控制模型,该模型对元组级安全标记、标签安全进行了探讨;把安全级分为分层密级和非分层范围组成的二元组与安全标签,达到元组级标签安全.鉴于强制存取控制模型在高安全数据库系统中的重要作用,在自行开发的具有自主版权的数据库管理系统LogicSQL上实现了该模型,使其至少达到B1级别安全.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z3期284-288,共5页 Journal of Computer Research and Development
基金 贵州省优秀科技教育人才省长专项基金项目(黔省专合字(2005)88号)
  • 相关文献

参考文献11

  • 1[1]Department of Defense (DOD).Trusted Computer System Evaluation Criteria (TCSEC) (DoD 5200.28-STD 1985).Fort Meade,MD:Department of Defense,1985
  • 2[2]R S Sandhu,Q Munawer.How to do discretionary access using roles.In:Proc the 3rd ACM Workshop on Role Based Access Control.New York:ACM Press,1988.47-54
  • 3[3]S Osborn.Mandatory access control and role-based access control revisited.In:Proc the 2nd ACM Workshop on Role Based Access Control.New York:ACM Press,1997.31-40
  • 4黄益民,平玲娣,潘雪增.一种基于角色的访问控制扩展模型及其实现[J].计算机研究与发展,2003,40(10):1521-1528. 被引量:42
  • 5[5]http://www.dameng.cn
  • 6[6]Yuan Liyan.The Documentation of LogicSQL.Alberta University,Canada,2005.http://www.shifang.com.cn
  • 7[7]P R Gallagher.Security of electronic information.The National Computer Security Center,Tech Rep:NCSC-TG-021,1991
  • 8[8]D E Bell,L J La Padula.Security Computer Systems:Mathematical Foundations and Model.Bedford:Mass Mitre Corp,1973.66-79
  • 9袁晓东,冯颖.B1级数据库管理系统强制存取控制模型研究[J].计算机学报,2000,23(10):1096-1101. 被引量:24
  • 10[10]The Documentation of Shifang Corp.http://www.shifang.cn

二级参考文献11

  • 11,Pfleeger C P. Security in Computing, Edition 2. Prentice-Hall, 1997
  • 22,Gallagher P R. Security of electronic information. The National Computer Security Center: Technique Report NCSC-TG-021, 1991
  • 33,Castano S, Fugini M, Martella G et al. Database Security. ACM Press & Addison-Wesley, 1994
  • 4R S Sandhu, E J Coync, H L Fcinstcin et al. Role-based access control model. IEEE Computer, 1996, 29(2): 38-47.
  • 5R Sandhu, D Ferraiolo, R Kuhn. The NIST model for role-based access control: Towards a unified standard. In: Proe of the 5th ACM Workshop on Role Based Access Control. Berlin, Germany: ACM Press, 2000. 47-63.
  • 6K Izaki, K Tanaka, M Takizawa. Access control model in obiectoriented systems. In: Proc of the 7th Int'l Conf on Parallel and Distributed Systems: Workshops. Iwate, Japan: IEEE Computer Society, 2000. 69-74.
  • 7M J Moyer, M Ahamad. Generalized role-based access control. In: Proc of the 21st Int'l Conf on Distributed Computing Systems. Phoenix: IEEE Computer Society, 2001. 391-398.
  • 8D Ferraiolo, R Sandhu, S Gavrila et al. A proposed standard for role-based access control. NIST. 2000. http://csrc. hist. gov/rbae/.
  • 9D K Gifford, P Jouvelot, M A Sheldon et al. The research file systems. In: Proc of the 12th ACM SIGOPS Symposium on Operating Systems Principles. Pacific Grove, CA: ACM Press,1991. 16-25.
  • 10乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75

共引文献63

同被引文献12

  • 1靳泰戈,余航,冯斌,周先涛,李骏.一种基于角色的访问控制模型及其实现[J].计算机应用研究,2005,22(12):138-140. 被引量:9
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3Sandhu R,Munawer Q.How to do discretionary access control using roles[C]. Proc the Third ACM Workshop on Role Based Access Control. Barkley:ACM Press, 1998:47-54.
  • 4Osborn S.Mandatory access control and role-based access control revisited [C]. Proc the Second ACM Workshop on Role Based Access Control.Virginia: ACM Press, 1997:31-40.
  • 5Yuan Li-Yan.The documentation of logic SQL[R]. Canada:Alberta University,2005.
  • 6Osbom S. Mandatory Access Control and Role-based Access Control Revisited[C]//Proc. of the 2nd ACM Workshop on Role-based Access Control. Virginia, USA: ACM Press, 1997.
  • 7Bell D E, LaPadula L J. Secure Computer Systems: Mathematical Foundations[R]. MITRE Corporation, Tech. Rep.: MTR-2547, 1973.
  • 8Biba K. Integrity Considerations for Secure Computer Systems[R]. Air Force Electronic Systems Division, Tech. Rep.: 76-372, 1977.
  • 9Denning D E. A Lattice Model of Secure Information Flow[J]. Comm. ACM, 1976, 19(5): 236-243.
  • 10李晓勇,左晓栋,沈昌祥.可信计算环境下敏感信息流的安全控制[J].计算机工程与设计,2007,28(15):3569-3572. 被引量:4

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部