期刊文献+

基于DTE技术的完整性保护形式模型 被引量:4

原文传递
导出
摘要 为实现结构化保护级操作系统的完整性保护,本文在深入分析完整性策略的结构和涵义的基础上,提出了基于DTE技术的完整性保护的形式模型;该模型由两部分组成:配置DTE的基本规则和状态迁移模型,前者解决如何设置相应的域和型,后者解决在系统变迁过程中如何维持初始设置获得的安全不变量.模型设置了10个不变量,特别提出了新的处理信息流的不变量,并探讨了与文献中相关不变量的关系.以可操作性很强的方式描述了13个具有良好原子性的迁移规则.随后,证明了相应的安全基本定理.在深入分析文献中现有模型与本模型异同的基础上,探讨了不变量设置的合理性.最后,指出未来要完成的工作,特别,用本模型去分析SELinux的安全性是可能的.
出处 《中国科学(E辑)》 CSCD 北大核心 2005年第6期570-587,共18页 Science in China(Series E)
基金 国家重点基础研究发展规划(G1999035802)国家自然科学基金(60083007)资助项目
  • 相关文献

参考文献26

  • 1Jueneman R R. Integrity controls for military and commercial applications. Fourth Aerospace Computer Security Applications Conference. Florida: IEEE Computer Society Press, 1988. 298~322.
  • 2Ruthberg Z G, Polk W T. Report of the Invitational Workshop on Data Integrity. National Institute of Standards and Technology, September 1989. NIST Special Publication 500-168.
  • 3Mayfield T, Boore J M, Welke S R. Integrity-oriented control objectives: proposed revisions to the trusted computer systems evaluation criteria (TCSEC, DoD5200.28.STD), IDA document D-967, prepared for National Security Agency (U. S.), available at http:∥www.mirrors.wiretapped.net/security/info/reference /ncsc-publications/C-TR- 111-91 .pdf.
  • 4Information Technology-Security Techniques-Evaluation Criteria for IT Security - Part 2: Security Functional Requirements. ISO/IEC 15408-2, 1999, International Standards Organization.
  • 5Abrams M D, Joyce M V. Trusted system concepts. Computers and Security, 1995, 14(1): 45~56.
  • 6Bell D E. Modeling the "multipolicy machine", in Proceedings of the 1994 ACM SIGSAC on New Security Paradigms Workshop, August 1994, Little Compton, RI USA. 2~9.
  • 7Mayfield T, Roskos J E, Welke S R, et al. Integrity in Automated Information Systems. NCSC Technical Report. National Computer Security Center, 1991.
  • 8Sandhu R S. On five definitions of data integrity. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, Alabama: Lake Guntersville, 1993.
  • 9LaPadula L J. Rule-set modelling of a trusted computer system. In: Abrams M D, Jajodia S, Podell H J,eds. Information Security: An Integrated Collection of Essays. Los Alamitos: IEEE Computer Society Press, 1995.
  • 10Kargar P A, Austel V, Toll D. A new mandatory security policy combining secrecy and integrity. IBM Research Report, RC21717, 2000.

同被引文献25

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部