期刊文献+

Biba模型中严格完整性政策的动态实施 被引量:15

Dynamic Enforcement of the Strict Integrity Policy in Biba's Model
下载PDF
导出
摘要 Biba模型中的严格完整性政策能够有效地保证数据的完整性,但是该政策中主体和客体的完整性标记都是静态不变的,这会限制进程的一些原本合理的活动,从而降低应用程序的兼容性.提出严格完整性政策的动态实施方案,并给出该方案在基于Linux的安全操作系统RFSOS中的实现.该方案既可以保证系统的完整性,又能提高系统的兼容性.实验证明,这种方案对系统的整体效率的影响小于1%. While the strict integrity policy (SIP) of Biba's model can be used to maintain integrity of data in computer systems, the integrity labels of both subjects and objects in a system are always kept static in SIP, which might lead to denial to some non-malicious access requirements and hence decreases the compatibility of applications Dynamic enforcement of this policy (DESIP) is presented, which can increase compatibility of software while keeping system integrity as strictly as SIP can The implementation of DESIP is also given based on RFSOS, a Linux-based operating system, which shows that the impact of the enforcement of DESIP on system efficiency is less than 1%
出处 《计算机研究与发展》 EI CSCD 北大核心 2005年第5期746-754,共9页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2002AA141080) 国家自然科学基金项目(60073022) 中国科学院知识创新工程基金项目(KGCX109)
关键词 信息安全 信息完整性 严格完整性政策 BIBA模型 information security information integrity strict integrity policy Biba's model
  • 相关文献

参考文献23

  • 1T. Fraser, L. Badger, M. Feldman. Hardening COTS software with generic software wrappers. The 1999 IEEE Symposium on Security and Privacy, Berkeley, California, 1999.
  • 2M. Beattie. MAC. http://users.ox.ac.uk/mbeattie/linux, 2002.
  • 3H.G. Xie, P. Biondi. LIDS. http : // www.lids.org, 2002.
  • 4T. Fraser. LOMAC: Low water-mark integrity protection for COTS environments. The 2000 IEEE Symposium on Security and Privacy, Oakland, CA, 2000.
  • 5C. Wright, C. Cowan, J Morris. Linux security modules:General security support for the Linux kernel. The 11th Annual USENIX Security Symposium, 2002.
  • 6M. Zelem, M. Pikula, M. Ockajak. Medusa DS9. http: //medusa.fornax.sk, 2002.
  • 7A. Ott. The rule set based access control (RSBAC) Linux kernel security extension. The 8th Int'l Linux Congress, Enschede,2001.
  • 8A. Ott. Rule set based access control (RSBAC) for Linux and Linux security module (LSM) . http: //www.sbac.org/lsm.htm, 2003.
  • 9T. Mayfield. Integrity in automated information system. National Computer Security Center, Technical Report, 1991. 79~ 91.http://www.radium.ncsc.mil/tpep/library/rainbow/C-TR-79-91.ps.
  • 10Joint Technical Committee 1. ISO/IEC 15408-2, 1999.

同被引文献103

引证文献15

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部