期刊文献+

基于可信级别的多级安全策略及其状态机模型 被引量:19

Trust Degree Based Multilevel Security Policy and Its Model of State Machine
下载PDF
导出
摘要 虽然MLS(multilevel security)被广泛应用于各种安全系统,但是它不能实现信道控制等重要的安全策略.将可信级别的概念引入到MLS中,使其可以方便地实现各种信道控制策略.建立了一个实现这种基于可信级别的多级安全策略的访问控制状态机模型,并证明其对定义的策略是安全的,而且可以实现所有静态信息流策略.另外,还扩展了该模型,使其可以支持存储对象安全属性的动态改变.该模型克服了MLS不能解决安全降级问题以及不考虑完整性的缺点,同时又保留了传统分级策略模型易理解、易使用的优点. MLS (multilevel security) is being widely applied in many security critical systems, but it can't implement many important security policies such as channel-control. In this paper, the concept of trust degree is introduced into the MLS to implement policies like channel-control conveniently. An access control state machine model which enforces the trust degree based multilevel security policy is established, and is proved to be secure for this policy. It is also proved that this model can enforce all static information flow policies. An extension of the model is also offered to support the dynamic change of storage objects' security labels. The model avoids the disadvantage of MLS' not being able to resolve the problem of secure downgrading and not taking integrity into consideration, and at the same time it retains the advantage of easy understanding and use enjoyed by the traditional classified policy models.
出处 《软件学报》 EI CSCD 北大核心 2004年第11期1700-1708,共9页 Journal of Software
基金 江苏省自然科学基金~~
关键词 安全策略 多级安全 访问控制模型 信息流模型 Information technology Mathematical models
  • 相关文献

参考文献8

  • 1Sandhu RS. Lattice-Based access control models. IEEE Computer, 1993,26(11):9-19.
  • 2Thomsen DJ, Haigh JT. A comparison of type enforcement and Unix setuid implementation of well-formed transactions. In: Proc. of the 6th Annual Computer Security Applications Conf. Tucson: IEEE Computer Society Press, 1990. 304~312.
  • 3Clark DD, Wilson DR. A comparison of commercial and military computer security policies. In: Proc. of the 1987 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society Press, 1987. 184-194.
  • 4Rushby J. Noninterference, transitivity, and channel-control security policies. Technical Report, CSL-92-02, Menlo Park: Stanford Research Institute, 1992.
  • 5Rushby J. Design and verification of secure systems. In: Proc. of the 8th ACM Symp. on Operating System Principles. Pacific Grove: ACM Press, 1981. 12-21.
  • 6Zhong Q, Edwards N. Security risk control of COTS-based applications. Technical Report, HPL-97-108, Bristol: HP Laboratories, 1997.
  • 7Walker KM, Sterne DF, Badger LM, Petkac MJ, Sherman DL, Oostendorp KA. Confining root programs with domain and type enforcement (DTE). In: Proc. of the 6th USENIX Security Symp. San Jose: USENIX Association, 1996. 21~36.
  • 8Schellhorn G, Reif W, Schairer A, Karger P, Austel V, Toll D. Verification of a formal security model for multiapplicative smart cards. In: Proc. of the 6th European Symp. on Research in Computer Security. Toulouse: Springer-Verlag, 2000. 17~36.

同被引文献181

引证文献19

二级引证文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部