期刊文献+

基于实体语义的多级安全数据模型

Multilevel Secure Data Modal Based on Entity Semantics
下载PDF
导出
摘要 提出了一种基于实体语义的多级安全数据模型。该模型借鉴了Smith-Winslett模型基于置信的语义和MLR模型数据借用的思想。定义了ESM数据模型,并描述了它的4个完整性性质和4个数据操作。ESM模型消除了语义模糊性,同时又保持了向上的信息流。证明了ESM模型的正确性、完备性和安全性。 A new multilevel secure data model is proposed which is based on the semantics of entities. It borrows the belief-based semantics from Smith Winslett model and the data-borrow idea from MLR model. This paper defines the ESM data model and describes its four integrity properties and tour data operations. ESM eliminates semantic ambiguity and retains upward information flow. This paper provcs soundness, completeness and security of ESM.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第8期157-158,212,共3页 Computer Engineering
关键词 多级安全 实体语义 语义模糊性 Multilevel security Entity semantics Semantic ambiguity
  • 相关文献

参考文献5

  • 1Lunt T F,Denning D E.The SeaView Security Modal [J].IEEE Transactions on Software Engineering,1990,16(6):593-607.
  • 2Jajodia S,Sandhu R.Toward a Multilevel Secure Relational Data Model [M].Information Security:An Integrated Collection of Essays.IEEE Computer Society Press,1995:461-491.
  • 3Smith K,Winslett M.Entity Modeling in the MLS Relational Model [C].Proceedings of the Very Large Database Conference,Vancouver,Canada,1992.
  • 4Chen F,Sandhu R.The Multilevel Relational (MLR) Data Model [J].ACM Transactions on Information and System Security,1998,1(1):93-132.
  • 5张原,史浩山.信息安全模型研究[J].小型微型计算机系统,2003,24(10):1878-1881. 被引量:4

二级参考文献9

  • 1Wittbold J T and Johnson D M. Information flow in nondeterministic systems[C]. In: Proc. IEEE Symp. on Security and Privacy, 1990,144-161.
  • 2Goguen J A and Meseguer J. Security policies and security models [C]. Int Proc. IEEE Syrup. on Security and Privacy, 1982,11-20.
  • 3McCullough D. A hookup theorem for multilevel security [J].IEEE Transaction on Software Engineering, April, 1995, 16(6) :563-568.
  • 4Denning D E. A lattice model of secure information flow [J].ACM Comm, May, 1976, 236-243.
  • 5Sandhu R S and Samarati P. Access control: principles and practice [J]. IEEE Communications Magazine, 1994, 40- 48.
  • 6Bell D E and LaPadula L J. Secure computer system: mathematical foundation and model, Miter Corp [R]. Report No. M74-244, Bedford, Mass , 1975. (NTIS Report No. AD-271543. ).
  • 7Gray J W. Toward a mathematical foundation for information flow security[C]. In: Proc. IEEE Symp. on Security and Privacy, 1991, 21-34.
  • 8McCullough D. Noninterference and the composability of security properties [C]. In: Proc. IEEE Symp. on Security and Privacy,1988, 177-186.
  • 9唐冶文,余巍,白英彩.信息安全形式化开发中的模型方法[J].小型微型计算机系统,1997,18(9):26-31. 被引量:4

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部