期刊文献+

基于BLP的安全操作系统信息安全模型 被引量:2

BLP-based Information Security Model in Secure Operating System
下载PDF
导出
摘要 提出并设计了一个安全操作系统的信息安全模型。该模型消除了仅以用户作为主体存在的不安全隐患,除保密性指标外考虑了完整性指标,限制了隐蔽通道,限制了可信主体以满足最小权限原则,进行了域隔离,缩小了理论模型与实际应用的差距,并应用到自主开发的安全操作系统WXSSOS中。 This paper proposes a security model of secure operating system. The model absorbes the idea in Biba model and RBAC model, and modifies the BLP model to mitigate the security threat. It extends the category of subject in BLP, and considers the integrity aspect except for the confidentiality aspect. Also, covert channels and the trust subject are limited in this model. It is applied in WXSSOS, which is a self-developed secure operating system.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第19期133-135,共3页 Computer Engineering
基金 浙江省自然科学基金资助项目(600014 M603228)
关键词 BLP 安全模型 访问控制 BLP Security model Access control
  • 相关文献

参考文献6

  • 1Bell D E, La Padula L J. Secure Computer System: Unified Exposition and MULTICS Interpretation. Mitre Corp., Technical Report 01730, Bedford MA: Mitre Corp., 1976
  • 2Biba K J. Integrity Consideration for Secure Computer System.Mitre Corp., Report MTR-2997, Bedford Mass: Mitre Corp., 1977
  • 3Spencer R, Smalley S. The Flask Security Architecture System Support for Diverse Security Policies. In: Proceedings of the 8th USENIX Security Symposium, Washington DC, USA, 1999-08
  • 4Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, 2675 Long Lake Road, Roseville, Minnesota 55113, 1997-06
  • 5Waldhart N A. The Army Secure Operating System. In: Proceedings of IEEE Symposium on Security and Privacy, 1990:50-60
  • 6Sandhu R S, Coync E J, Fcinstcin H L. Role-based Access Control Model. IEEE Computer, 1996, 29(2): 38-47

同被引文献6

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部