期刊文献+

对象关系型DBMS的强制访问控制研究

Researches on Mandatory Access Control in ORDBMS
下载PDF
导出
摘要 论文研究了对象关系数据库管理系统的强制访问控制,在达梦对象关系数据库管理系统的安全对象概念及其对象特性的基础上,给出了标识对象安全级的策略和过滤对象的访问控制策略,重点讨论了过滤对象的约束策略。 In this paper,Mandatory Access Control(MAC) in Object Relational Database Management System(ORDBMS) is discussed.Based on the concepts and features associated with security object in DaMeng ORDBMS,the policy of labelling objects and filtering objects in MAC is presented,and the constraints policy of filtering objects is discussed emphatically.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第9期169-171,204,共4页 Computer Engineering and Applications
基金 湖北省科技攻关资助项目(编号:2002AA103A06)
关键词 安全对象 对象标记 对象过滤 约束策略 security object,object label,object filter,constraints policy
  • 相关文献

参考文献4

  • 1Sharon Lewis,Simon Wiseman.Securing an object relational database[J].British Crown,1997:59~68
  • 2S Jajodia,B Kogan.Integrating an Object-oriented Data Model with Multi_level Security[C].In:proceedings of the 1990 IEEE Symposium on Research in Security and Privacy,1990:76~85
  • 3Andrew Eisenberg,Jim Melton.SQL:1999,formerly known as SQL3[J].SIGMOD Record,1999;28(1):131~138
  • 4王昌达,鞠时光.BLP安全模型及其发展[J].江苏大学学报(自然科学版),2004,25(1):68-72. 被引量:11

二级参考文献16

  • 1[1]Bell D E, La Padula L J. Secure computer system: Unified exposition and MULTICS interpretation[R]. The MITRE Corporation, TechRep: MTR-2997 Revision 1, 1976.
  • 2[2]Lin Bell T Y, LaPadula Axioms. A "new" paradigm for an "old" model[J]. ACM,1993,82-93.
  • 3[3]Denning D E. A lattice model of secure informationflow[J].Communications of the ACM,1976,19(5):236-243.
  • 4[4]Gregory R Andrews, Richard P Reitman. An axiom axiomatic approach to information flow in programs[J].ACM Transaction on Programming Languages and System,1980,2(1):56-76.
  • 5[5]Dorothy E Denning, Peter J Denning. Certification of programs for secure information flow[J]. Communications of the ACM,1977,20(7):504-513.
  • 6[6]Cohen E. Information transmission in computational systems[A]. In:Operating System Principles[C]. Proc 6th Syrup,1977,11:133-139.
  • 7[7]Jones A K, Lipton R J. The enforcement of security policies for computation[A]. In:Operating System Principles[C].Proc 5th Syrup,1975,11:197-206.
  • 8[8]John McHugh. Covert channel analysis: a chapter of the handbook for the computer security certification of trusted systems[R]. Portland State University, 1995.
  • 9[9]Lin T Y. Probabilistic measure on aggregation[A]. In:Security Application Conference[C].Proceeding of 6th Annual Computer, 1990.
  • 10[10]Steven T Eckmann. Eliminating formal flows in automated information flow analysis[J].IEEE,1994:30-38.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部