期刊文献+

可信计算机系统评测准则对基于可信主体DBMS体系结构设计的影响 被引量:1

Influence to Design of Trusted Subject DBMS Architecture by the Trusted Computer System Evaluation Criteria
下载PDF
导出
摘要 分析了《可信计算机系统评测准则》对基于可信主体DBMS体系结构设计的影响,通过一个基于角色机制的DBMS体系结构设计实例,探讨了不同评测标准对该DBMS的存取控制、体系、TCB和事务处理结构的影响,最后给出了该DBMS的总体设计。 The paper analyses the influence to design of trusted subject DMBS architecture made by the Trusted Com-puter System Evaluation Criteria.Through an architecture design instance of DBMS based on role-based access control,the paper discusses the influence of different evaluation criteria to access control,structure,TCB and transaction system structure of the DBMS.At the end of the paper,a total design of the DBMS is given.
作者 钟勇
出处 《计算机工程与应用》 CSCD 北大核心 2005年第2期176-178,229,共4页 Computer Engineering and Applications
基金 航空科学基金项目(编号:02F52033)资助
关键词 可信计算机评测准则 安全数据库 基于角色的存取控制 可信主体 Trusted Computer System Evaluation Criteria(TCSEC),secure database,role-based access control,trusted subject
  • 相关文献

参考文献12

  • 1National Computer Security Center.Trusted Database Management System Interpretation of the TCSEC[M].Version 1 ,NCSC-TG-021, 1991-04.
  • 2LouAnna Notargiacomo.Architectures for MLS database management systems[C].In:M Abrams,S Jajodia,H Podell eds.Information Security: An Integrated Collection of Essays,IEEE Computer Society Press,1994.
  • 3Sandhu R,Munawer Q.How to do discretionary access control using roles[C].In:3rd ACM Workshop on Role-Based Access Control,1998: 47 -54.
  • 4Osborn S,Sandhu R,Nunawer Q.Contlguring Role-Based Access Control To Enforce Mandatory and Discretionary Access Control Policies[J].ACM Trans on Info Syst Security,2000;3(2).
  • 5D Ferraiolo,R Sandhu,S Gavfila et al.Proposed NIST Standard for Role-Based Access Control[J].ACM TISSEC,2001;4(3).
  • 6Role Based Access Control,American National Standard for information Technology BSR INCITS 359[S].Draft 4/4/2003.
  • 7ZHONG Yong,QIN Xiao Lin.Adaptive Data Protection Mechanism in Intrusion Tolerant Multilevel Secure Database[C].In:the Proceedings of the Second Asian Workshop on Foundations of Software,Nanjing, China,2003-12:21-24.
  • 8Ravi Sandhu,Qamar Munawer.The ARBAC99 Model for Administration of Roles,ACSAC, 1999.
  • 9Sandhu R,F Chen.Constraints for role-based access control[C].In: Proceedings of the first ACM Workshop on Role-based access control, 1996.
  • 10P Ammann,S Jajodia,C McCollum.Surviving information warfare attacks on databases[C].In:Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1997-05 : 164-174.

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部