期刊文献+

基于框架的形式化商务安全策略模型 被引量:2

A Formal Commercial Secure Policy Model Based on Framework
下载PDF
导出
摘要 商务信息系统安全的核心目标是维持系统数据的完整性 .虽然研究人员已提出许多完整性安全原则 ,但至今仍然缺乏一种系统的商务安全策略 .本文所提出的基于框架的形式化商务安全策略模型 (FB FCSM)是一个集成多种完整性原则的系统性商务完整性模型 ,具有良好的兼容性和扩展性 ,是Clark Wilson完整性安全策略的精化 . The key of security on commercial information systems is to preserve the data integrity within them.Although many integrity principles have been discussed,there is still lack of a systematic commercial secure policy model.A Formal Commercial Secure Policy Model Based on Framework(FB FCSM) is proposed,which integrates multi integrity principle into one systematic commercial secure model.The model has not only good compatibility but also sound scalability,and is a refinement of Clark Wilson Integrity Secure Policy.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第2期222-226,共5页 Acta Electronica Sinica
基金 国家自然科学基金 (No .60 0 830 0 7/ 60 3730 39) 国家重点基础研究发展规划 (973) (No .G1 9990 3580 2 )
关键词 信息系统安全 形式化商务安全策略 完整性 information system security formal commercial secure policy model integrity
  • 相关文献

参考文献7

  • 1D D Clark,D R Wilson.A comparison of commercial and military computer security policies[A].IEEE Symposium on Security and Privacy[C].Oakland,CA:IEEE press,1987.184-194.
  • 2S Fischer-Hübner.IT-Security and Privacy-Design and Use of Privacy-Enhancing Security Mechanisms[M].NY:Springe,2001.201-257.
  • 3T Mayfield,J E Roskos,S R Welke,J M Boone.Integrity in Automated Information Systems[R].U.S.National Computer Security Center,1991.79-91.
  • 4U S DoD.A Guide to Understanding Security Modeling in Trusted Systems[R].NCSC-TG-010,U.S.National Computer Security Center,Oct.1992.
  • 5H Anthony Z.Styles for security properties and modern user interfaces[A].A AliE,R Peter,S Steve(Eds.):Formal Aspects of Security,First International Conference[C].London:Publishing Springer,2003.152-166.
  • 6R Ramakrishnan,J Gehrke.Database Management Systems(2th ed.)[M].New York:McGraw-Hill,2000.51-83.
  • 7Matunda Nyanchama.Commercial Integrity,Roles and Object Orientation[D].London,Ontario,Canada:Department of Computer Science,Faculty of Graduate Studies,University of Western Ontario,1994.

同被引文献11

  • 1何再朗,田敬东,张毓森.策略冲突类型的细化及检测方法的改进[J].吉林大学学报(信息科学版),2005,23(3):287-293. 被引量:10
  • 2姚键,茅兵,谢立.一种基于有向图模型的安全策略冲突检测方法[J].计算机研究与发展,2005,42(7):1108-1114. 被引量:29
  • 3穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 4Tang Chenghua, Yao Shuping, Cui Zhongjie, et al. A Network Security Policy Model and Its Realization Mechanism[C]//Inscrypt 2006 (LNCS 4318). Berlin : Springer-Verlag, 2006 : 168-181.
  • 5Clark D, Wilson D. A Comparison of Commercial and Military Computer Security Policies[C]//IEEE Symposium on Security and Privacy. Oakland: IEEE Press, 1987 : 184-194.
  • 6Pepyne D L, Panayiotou C G, Cassandras C G, et al. Vulnerability Assessment and Allocation of Protection Resources in Power Systems[ C ]/ / Proceedings of the American Control Conference. New York: IEEE Press, 2001: 4705-4710.
  • 7Li Y W. An Approximate Reasoning Model for Situation and Threat Assessment[C]//FSKD 2007. Haikou : IEEE Press, 2007 : 246-250.
  • 8Mees W. Risk Management in Coalition Networks [-C]//Third International Symposium on Information Assurance and Security. Manchester: IEEE Press, 2007:329-336.
  • 9Butler S A. Security Attribute Evaluation Method: A Cost-Benefit Approach [ C] / / International Conference on Software Engineering. Orlando: IEEE Press, 2002:232-240.
  • 10卿斯汉,李丽萍,何建波,沈晴霓.基于DTE策略的安全域隔离Z形式模型[J].计算机研究与发展,2007,44(11):1881-1888. 被引量:6

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部