期刊文献+

基于强制访问控制的文件安全监控系统的设计与实现 被引量:15

Design and implementation of file watching system based on mandatory access control
下载PDF
导出
摘要 重点分析了基于信息保密的BLP(Bell-LaPadula)模型和基于信息完整性的Biba模型,基于这两个模型设计了兼顾系统保密性和完整性需求的强制访问控制模型,并结合Windows文件过滤驱动程序开发了一个基于该强制访问控制模型的文件安全监控系统,对其主要模块和关键技术进行了详细介绍。该文件安全监控系统可有效地维护文件系统的保密性和完整性,检测并阻断本地与网络的入侵。 Bell-Lapadula model based on information confidentiality and Biba model based on information integrity were introduced. Then a new Mandatory Access Control (MAC) model based on the two modules above was designed. By using Windows NT file filter driver, a file watching system which adopted this new MAC model was developed, and the components and key technologies of it were given in detail. This file watching system has the advantages of protecting information confidentiality and integrity, and resisting the attacks from both local and remote users.
出处 《计算机应用》 CSCD 北大核心 2006年第12期2941-2944,共4页 journal of Computer Applications
基金 航空基金资助项目(04C52009) 国防工业基础基金资助项目(Q172005A001)
关键词 强制访问控制 模型 文件过滤驱动 文件监控系统 Mandatory Access Control (MAC) model NT file filter driver file watching system
  • 相关文献

参考文献10

  • 1SAMARATI P,DE CAPITANI DI VIMERCATI S.Access Control Policies,Models and Mechanisms[A].Foundations of Security Analysis and Design:Tutorial Lectures[C].London,UK:Springer-Verlag,2003,Vol 2171:137-196.
  • 2BELL DE,LAPADULA L.Secure Computer Systems:Mathematical Foundations and Model[R].Technical Report M 74 -244,Mitre Corp,Bedford,MA,1973.
  • 3庄毅,潘龙平,刘坤.分布式资源安全监控系统模型的研究[J].南京航空航天大学学报,2006,38(1):86-90. 被引量:1
  • 4潘龙平,庄毅,吴学成.基于强制访问控制的安全Linux系统设计与实现[J].计算机工程与应用,2006,42(5):142-145. 被引量:2
  • 5NAGAR R.Windows NT File System Internals[M].O'REILLY,1997.
  • 6BAKER A,LOZANO J.Windows2000设备驱动程序设计指南[M].施诺,等译.北京:机械工业出版社,2001.
  • 7刘海峰,卿斯汉,刘文清.安全操作系统审计的设计与实现[J].计算机研究与发展,2001,38(10):1262-1268. 被引量:27
  • 8[美]Internet Security Systems公司.Windows 2000安全技术参考[M].北京:机械工业出版社,2001.
  • 9SOLOMON DA,RUSSINOVICH ME.Inside Microsoft Windows 2000[M].Microsoft Press,2000.
  • 10WU SL,SHETH A,MILLER JA,et al.Authorization and Access Control of Application Data in Workflow Systems[J].Intelligent Information Systems,2002,18(1):71 -94.

二级参考文献20

  • 1GollmannD..Computer security[M].北京:人民邮电出版社,2003.25-49.
  • 2Pierangela S,De Capitani di Vimercati S.Accesscontrol policies,models,and mechanisms[M].Berlin Heidelberg:Springer Verlag,2001:137-162.
  • 3Huang Yimin,Ping Lingdi,Pan Xuezeng.Research on information security model and security system design[J].Journal of Zhejiang University,2001,35(6):603-607.
  • 4TanenbaumAS..Distributed operating systems[M].北京:清华大学出版社,1997.110-114.
  • 5徐明 庄毅.一种基于软件一致性协议的分布式共享存储器系统[J].南京大学学报:自然科学版,2001,37(10):265-268.
  • 6Wang Jinshuang,Zhang Tao,Zhang Yusen.Implementation and application of BLP model under Linux environment[J].Journal of PLA University of Science and Technology:Natural Science Edition,2004,5(3):20-23.
  • 7Henderson B.Linux loadable kernel module HOWTO [EB/OL].http://www.tldp.org/howto/module-howto/index.html,2004-01,2005-04-2.
  • 8Nagar R.Windows NT file system internals[M].Sebastopol USA O'Reilly:Sebastopol,1997:615-667.
  • 9DieterGollmann.Computer Security[M].人民邮电出版社,2003—06..
  • 10Pierangela Samarati, Sabrina. Access Control Policies, Models, and Mechanlsms.In:Foundations of Security Analysis and Design:Tutorial Lectures, 2003-06.

共引文献28

同被引文献75

引证文献15

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部