期刊文献+

基于多级安全策略的二维标识模型 被引量:28

A Planar Attributes Model Based on Multi Level Security Policy
下载PDF
导出
摘要 安全模型是用形式化的方法来描述如何满足系统的安全要求 .经典的安全模型都只能要么满足系统的保密性要求 (如BLP模型 ) ,要么满足完整性的要求 (如Biba模型 ) .该文提出了一个多级安全策略的二维标识模型 ,在对可信主体必须遵守最小特权原则的前提下 ,利用保密性标识和可信度标识共同构成主客体的访问标识 ,并利用两个约束条件 ,使得既能防止越权泄露信息 ,又能控制信息的非授权修改 ,从而同时保证了系统的保密性和完整性 . Security model is the foundation for meeting the security needs of information systems. Classical security models can only meet either confidentiality or integrity. None of model could resolve both of security requirements simultaneously. This paper presents a planar attributes model based on multi level security policy. In the model, the trusted subjects must accord with the least privilege principle. The concepts of confidence level and trusted level as labels of subjects and objects for constraining subjects accessing to objects are briefly described. This paper details a formal description and verification on the model which provides both the confidentiality and integrity for the system. It also explain the model in informal language briefly to help understand. Lastly, some open issues about model implementation are discussed, and the future direction of the model is pointed out. This model will be beneficial to be successful applied to constructing security systems in practices.
出处 《计算机学报》 EI CSCD 北大核心 2004年第5期619-624,共6页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金 (G19990 3 5 80 1)资助
关键词 多级安全策略 二维标识模型 安全模型 最小特权 系统保密性 完整性 multi level security policy security model trusted level the least privilege
  • 相关文献

参考文献4

  • 1Bell D.E., Lapadula L.J.. Secure computer systems. Mitre Corporation, Bedford, MA, USA: Technical Report MTR-2547 (Vol Ⅰ-Ⅲ), 1973
  • 2Biba K.J.. Integrity considerations for secure computer systems. Mitre Corporation, Bedford, MA, USA: Technical Report MTR-3153, 1977
  • 3Di Vito Ben L., Palmquist P.H., Anderson E.R., Johnston M.L.. Specification and verification of the ASOS kernel. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, 1990, 61~74
  • 4Waldhart N.A.. The army secure operating system. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, 1990, 50~60

同被引文献242

引证文献28

二级引证文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部