期刊文献+

多安全策略集成性问题的分析与解决

Analysis and Resolution of Integration of Multi Security Policies
下载PDF
导出
摘要 解决多安全策略的集成性问题是安全操作系统支持多策略和动态策略的基础。本论文采用形式化的方法为安全系统建立了全局安全状态的迁移模型,以TE和RBAC策略为例分析了不同策略作用下安全关联行为对安全状态的影响,并根据T&R集成模型提出了解决多策略集成性和一致性问题的思想,为安全操作系统的实现奠定了基础。 Resolution of integration of multi security policies is the base problem in secure OS which supports multi security policies and dynamic policies. This paper uses a state transition approach to formally analyze a security system and presents the different effects resulted by security-depended actions of different policies on security states. We will analyze TE ,RBAC model and T&R model (their integration model) .present a thinking to tackle the hybrid integration and consistency of multi-policies .which lay the foundation for implementing secure OS.
出处 《计算机科学》 CSCD 北大核心 2004年第5期117-120,共4页 Computer Science
基金 十五国防预研项目
关键词 多安全策略 集成性问题 安全操作系统 TE策略 RBAC策略 安全关联行为 状态迁移模型 Security policy,Secure OS,State transition model,Integration
  • 相关文献

参考文献7

  • 1李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现[J].软件学报,2000,11(10):1320-1325. 被引量:48
  • 2[2]Schneider F B. Enforceable security policies. ACM Transactions on Information and System Security (TISSEC), 2000,3 (1)
  • 3[3]Badger L, et al. Practical Domain and Type Enforcementfor UNIX. In: Proc. of the 1995 IEEE Symposiumon Security and Privacy,Oakland,California,May 1995. 66~77
  • 4[4]Ravi Sandhu. Role-based access control models. IEEE Computer,1996,29(2): 38~47
  • 5吴新勇,熊光泽.支持动态策略的安全核(Security Kernel)机制的研究[J].计算机科学,2002,29(11):154-156. 被引量:3
  • 6[6]Bell D E,LaPadula L J. Secure Computer Systems : Mathematical Foundations : [ESD-TR-73-278]. Vol. Ⅰ, AD 770 768, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, MA,USA, Nov. 1973
  • 7[7]Biba. Integrity Considerations for Secure Computer Systems:[ESD-TR-76-372 ]. Electronic Systems Division, Air Force Systems Command,Hanscom Air Force Base,Bedford,MA,USA,Apr. 1977

二级参考文献16

  • 1NCSC. Trusted Computer System Evaluation Criteria. Department of Defence U.S.A. 1985. DoD .5200. 28-STD
  • 2Trusted Information Systems, Inc. Trusted Mach System Architecture. Oct. 1 995
  • 3Key Logic, Inc. Introduction to KeySAFE. Key Logic Document SEC009
  • 4Secure Computing Corporation. DTOS Lessons Learned Report. DTOS CDRL A008,June 1997
  • 5Loscocco P,Smalley S. Integrating Flexible Support for Security Policies into the Linux Operating, NSA Labs, Jan. 2001
  • 6中软安全增强Linux.http:∥linux.cosix.com.cn
  • 7King R. Safety kernel enforcement of software safety policies: [Doctor Thesis]. USA: University of Virginia ,1995
  • 8Graham G S,Denning P J. Protection - principles and practice. In: Proc. AFIPS 1972 SJCC, AFIPS Press, 1972,40:417~429
  • 9Bell D E,La Padula L J. Secure computer systems: Mathematical foundations and model: [Technical Report M74-244]. The MITRE Corporation, May 1973
  • 10O'Brien R C,Rogers C. Developing applications on LOCK. In: Proc. 14th National Computer Security Conf. Washington, DC, Oct. 1991. 147~156

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部