期刊文献+

基于Logic SQL安全数据库的隐蔽通道分析

COVERT CHANNEL ANALYSIS OF SECURITY DATABASE BASED ON LOGIC SQL
下载PDF
导出
摘要 Logic SQL数据库是自主研制基于linux的高安全级别安全数据库,本文根据近年来成熟的隐蔽通道分析技术针对Logic SQL安全数据库的隐蔽通道进行分析,从隐蔽通道的标识、带宽的计算、隐蔽通道的处理等方面进行分析。并展望下一步Logic SQL安全数据库的隐蔽通道研究方向。 Logic SQL database is a high level security database that is independently developed based on Linux. This paper analyzed the covert channel of Logic SQL database applying the matured technology of covert channel analysis in recent years, which is to analyze the marking of the covert channel, the computation of the band width, and the processing of the covert channel. The farther direction of the study for the covert channel of the security database of Logic SQL was forecasted.
出处 《贵州科学》 2006年第4期60-63,共4页 Guizhou Science
基金 贵州省长专项基金资助黔省专合字(2005)88号
关键词 安全数据库 LOGIC SQL 隐蔽通道分析 共享资源矩阵 security database Logic SQL covert channel analysis sharing resources matrix
  • 相关文献

参考文献6

  • 1张剡,夏辉,柏文阳.数据库安全模型的研究[J].计算机科学,2004,31(10):101-103. 被引量:12
  • 2Lampson BW. A note on the confinement problem [J].CACM, 1973,16(10)
  • 3卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 4Peter Rob,Carlos Coronel.数据库系统设计、实现与管理[M].北京:清华大学出版社,2005
  • 52002 GA/T:389—200,中华人民共和国公安部.计算机信息系统安全等级保护数据库管理系统技术要求[S].
  • 62002 GA/T:390-2002,中华人民共和国公安部.计算机信息系统安全等级保护通用技术要求[S]

二级参考文献31

  • 1Bell D E,Lapadula L J. Secure Computer Systems: Unified Exposition and Multics Interpretation, MTR-2997, MITRE, March 1976
  • 2Denning. The SeaView Security Model. IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press,Los Alamitos, CA,1988. 218-233
  • 3Jajodia S,Sandhu R. Toward a Multilevel Secure Relational Data Model, Information Security: An Integrated Collection of Essays:IEEE Computer Society Press, 1995. 461-491
  • 4Sandhu R,Chen F. The Multilevel Relational (MLR)Data Mode.ACM Transactions on Information and System Security, 1998, 1(1)
  • 5Kemmerer RA, Taylor TA. Modular covert channel analysis methodology for trusted DG/UXTM. IEEE Trans. on Software Engineering, Vol. 22, 1996.
  • 6Denning DE. A lattice model of secure information flow. Communications of the ACM, 1976. 236-243.
  • 7He J, Gligor VD. Information flow analysis for covert-channel identification in multilevel secure operating systems. In: Proc. of the 3rd IEEE Workshop on Computer Security Foundations. 1990. 139-148.
  • 8Feiertag R. A technique for proving specifications are multilevel secure. Technical Report CSL-109, 1980.
  • 9Feiertag R, Levitt KN, Robinson L. Proving multilevel security of a system design. In: Proc. of the 6th ACM Symp. on Operating Systems Principles. 1977.57-65.
  • 10Goguen JA, Meseguer J. Security policies and security models. In: Proc. of the IEEE Symp. on Security and Privacy. 1982. 11-20.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部