期刊文献+

对军用安全模型的扩展 被引量:4

Extension to Military Security Model
下载PDF
导出
摘要 军用安全模型是一种适合于诸如政府部门、军队等涉密组织,信息系统内对信息流进行控制的多级安全模型,原理是依据线性格与子集格的乘积格实施信息流控制的,但所描述的关系在实际应用中存在着缺陷。新模型则利用敏感级格与组织内部的层次格的乘积格反映组织内部带敏感性的“层级”关系,然后再与信息的子集格相乘形成更为合理的访问控制与信息流控制关系,从而使其更适合于军队、政府部门或各类涉密组织的信息系统对信息和信息流的安全控制要求。 The military security model (MSM) is a multilevel security model which used to control information flows within an information system with secret (such as government department, military etc.) . In the old model, it depends on product lattice of linear lattice and subset lattice for information flow control. But relationships described in this model exists drawbacks in applications. In the new model, the product lattice which is a sensitivity lattice multiplying by organization level lattice is mapped to level relations with sensitivity within an organizations. Then, a more proper relationships which is multiplying the product lattice by lattice of information subset are formed for access control and flow control. So it make the new model more suitable to control the information flow security for information systems of military , government departments or various organizations.
作者 肖军模
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2005年第2期186-189,共4页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金资助项目(69931040)
关键词 军用安全模型 信息流策略 多级安全 格安全模型 military security model information flow police multilevel security lattice security model
  • 相关文献

参考文献3

  • 1Denning D E. Secure information flow in computer systems: [ph. D Thesis] [D]. Purdue Univ, W Lafayette, Ind 1975.
  • 2Denning D E. A lattice model of secure information flow [J]. Comm ACM, 1976,19(5): 236-243.
  • 3Landwehr C E, Heitmeyer C L, Mclean J. A security model for military message systems[J]. ACM Transactions on Computer Systems, 1984, 9(3): 198-222.

同被引文献23

  • 1Bell D E,Leonard J L.Secure computer system:Unified exposition and MULTICS interpretation, MTR-2997[R].Bedford, MA, USA: The Mitre Corporation, 1976.
  • 2Sandhu R S, Coyne E J, Feinstein H L.Role-based access control models [J].IEEE Computer, 1996,29 ( 2 ) : 38-47.
  • 3Lee E S.Essays about computer security[M].Centre for Communications Systems Research, Cambridge, 1999:153-163.
  • 4雷新锋,刘军.基于RBAC扩展模型的BLP及Biba模型实现[C]//中国计算机学会信息保密专业委员会论文集,绵阳,2005.
  • 5Hu Hao, Feng Dengguo.BIFI: Architectural support for information flow integrity measurement[C]//Proeeedings of the 2008 International Conference on Computer Science and Software Engi- neering.Massachusetts Ave, NW Washington, DC USA: IEEE Computer Society, 2008: 605-609.
  • 6Sandhu R S.Lattice-based access control models[J].IEEE Computer, 1993,26(11):9-19.
  • 7Harrison M A, Ruzzo W L, Ullman J D. Protection in operating systems. Comm ACM 19(8):461~471
  • 8Sandhu R S. Role-Based Access Control. Laboratory for Information Security Technology ISSE Department, MS 4A4 George Mason University, http://www.issue.gmu.edu/faculty/sandhu
  • 9Denning D E. Secure Information Flow in Computer Systems. ph D Thesis, Purdue Univ, W Lafayette, Ind
  • 10DENNING D E.Secure information flow in computer systems[D].W.Lafayette,Ind.:Purdue Univ.,1975.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部