期刊文献+

一种基于用户意愿的数据保护模型

A Data Protection Model Based on User's Intention
下载PDF
导出
摘要 基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型.该模型对DAC访问控制机制进行了增强,当进程实际访问用户数据时,进程必须先获得操作用户的意愿,用户根据进程的任务赋予进程访问系统最小必需数据集的权限,使进程无法访问任务之外的数据集,防止进程因权限过大破坏用户数据.测试结果表明,该模型可以有效地阻止进程的非法访问而确保数据不被窃取或破坏. After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle. This model has reinforced the DAC access control mechanism. When process accesses user's data, the process has to gain the user's intention. Based on the task of the process, the user will endow the process minimal rights to access the related data, which will prevent the process from accessing data that are not concerned with the task. Thus it will prevent process destroy user's data because of overusing access rights. The test result shows that this model can effectively stop the unauthorized access and protect data from destructing or stealing.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2006年第5期574-577,共4页 Journal of Wuhan University:Natural Science Edition
基金 国防预研基金资助项目(51436050505KG0101)
关键词 信息安全 数据保护 用户意愿 information security data protection intention of user
  • 相关文献

参考文献14

  • 1The International Organization for Standardization.Common Criteria for Information Technology Security Evaluation [EB/OL]. [2006-01-15]. http://www.commoncriteriaportal.org/ public/files/ ppfiles/ PP-9806. pdf.
  • 2Sandhu R, Coyne E J, Feinstein H L. Role-Based Access Control Models[J]. IEEE Computer, 1996,29(2 ):38-47.
  • 3Sandhu R, Ferraiolo D F, Kuhn D R. The NIST Model for Role-Based Access Control: Towards a Unified Standard[C]//Proceedings of the Fifth ACM Work-shop on Role-Based Access Control. New York: ACM Press, 2000 : 47-63.
  • 4Chandramouli R, Sandhu R. Role Based Access Control Features in Commercial Database Management Systems [EB/OL]. [2006-01-15]. http://csrc. hist.gov/rbac / RBAC_DBMS_Com parison.pdf.
  • 5Chandramouli R. A Framework for Multiple Authorization Types in a Healthcare Application System[C]//17th Annual Computer Security Applications Conference. Washington: IEEE Computer Society Press, 2001:137-148.
  • 6Chandramouli R. Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints [EB/OL]. [2006-01-18]. http ://csrc.nist. gov/rbac/Access_ control_ data _ spec _validate.pdf .
  • 7Ferraiolo D F, Kuhn D R. Role Based Access Control[EB/OL].[2006-01-15]. http://csrc.nist.gov/rbac/ferraiolo-kuhn- 92.pdf.
  • 8Microsystems S. Java Security Architecture[EB/OL].[2006-03-15]. http://java. sun.com/j2se/1. 5. 0/docs/guide/security/spec/security-specTOC.fro. html.
  • 9Prabhat K, Lakhotia A. Analysis and Detection of Computer Viruses and Worms: An annotated bibliography[J]. ACM SIGNPLAN Notices, 2002,37 ( 2 ) :29-35.
  • 10Cohen F. Computational Aspects of Computer Viruses[J]. Computers and Security, 1989,8(9) :325.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部