期刊文献+

一种基于BLP模型的访问控制设计方案 被引量:1

SCHEME OF ACCESS CONTROL BASED ON BLP MODEL
下载PDF
导出
摘要 操作系统作为信息系统的基础,其安全性不容忽视。实现操作系统的安全性需从多方面考虑。访问控制是实现操作系统安全的重要手段。文章从规范系统内的信息流向出发,引用经典的BLP安全模型,制订了1个小型系统的访问控制设计方案。方案以访问动作为控制对象,着重体现了BLP模型所要求的机密性,同时也对完整性有所考虑。 As the base of the information system, operating system is very important, especially it's security. Access control, one of several ways which can reinforce our OS, is a primary way to realize the objective. In the article, Classical BLP Model was introduced to confine the flow of information in order to implement one scheme of AC. Using the operating action as object of control, the scheme pay much attention to the confidentiality of BLP Model, and also give consideration to the integrity.
作者 岳兵 刘鹏
出处 《内蒙古农业大学学报(自然科学版)》 CAS 2006年第4期135-139,179,共6页 Journal of Inner Mongolia Agricultural University(Natural Science Edition)
关键词 操作系统安全 BLP模型 访问控制 安全格 OS security BLP model access control security lattice
  • 相关文献

参考文献12

  • 1Bell D E, LaPadula L J C. Secure Computer systems:Mathematical Foundations. The MITRE Corporation, Bedford, Massachusetts: Technical Report M74 - 244,1973.
  • 2Bell D E, LaPadula L J C. Secure Computer systems: A Mathematical Model. The MITRE Corporation, Bedford,Massachusetts : Technical Report M74 - 244,1973.
  • 3Bell D E, LaPadula L J C. Secure Computer systems : Unified exposition and multics interpretation. The MITRE Corporation, Bedford, Massachusetts : Technical Report M74- 244,1973.
  • 4R.S. Sandhu. Lattice - based access control models.IEEE Computer, 26( 11 ) pages 9 - 19, November 1993.
  • 5J. H. Sahzer. Protection and the control of information sharing in Multics. Communications of the ACM, 17 pages 388 - 402,1974.
  • 6B. Lampson, M. Abadi, M. Burrows, and E. Wobber.Authentication in distributed systems: Theory and Practice. ACM Transactions on Computer system, 10(4) pages 265 -310, November 1992.
  • 7刘克龙,卿斯汉,冯登国.一种基于BLP模型的安全Web服务器系统[J].计算机学报,2003,26(10):1280-1287. 被引量:11
  • 8DieterGollmann 华蓓 蒋凡 史杏荣译.计算机安全[M].北京:人民邮电出版社,2003..
  • 9北京中科红旗软件技术有限公司,Red Flag Server 4.0安全技术白皮书,2003.
  • 10王昌达,鞠时光.BLP安全模型及其发展[J].江苏大学学报(自然科学版),2004,25(1):68-72. 被引量:11

二级参考文献25

  • 1[1]Bell D E, La Padula L J. Secure computer system: Unified exposition and MULTICS interpretation[R]. The MITRE Corporation, TechRep: MTR-2997 Revision 1, 1976.
  • 2[2]Lin Bell T Y, LaPadula Axioms. A "new" paradigm for an "old" model[J]. ACM,1993,82-93.
  • 3[3]Denning D E. A lattice model of secure informationflow[J].Communications of the ACM,1976,19(5):236-243.
  • 4[4]Gregory R Andrews, Richard P Reitman. An axiom axiomatic approach to information flow in programs[J].ACM Transaction on Programming Languages and System,1980,2(1):56-76.
  • 5[5]Dorothy E Denning, Peter J Denning. Certification of programs for secure information flow[J]. Communications of the ACM,1977,20(7):504-513.
  • 6[6]Cohen E. Information transmission in computational systems[A]. In:Operating System Principles[C]. Proc 6th Syrup,1977,11:133-139.
  • 7[7]Jones A K, Lipton R J. The enforcement of security policies for computation[A]. In:Operating System Principles[C].Proc 5th Syrup,1975,11:197-206.
  • 8[8]John McHugh. Covert channel analysis: a chapter of the handbook for the computer security certification of trusted systems[R]. Portland State University, 1995.
  • 9[9]Lin T Y. Probabilistic measure on aggregation[A]. In:Security Application Conference[C].Proceeding of 6th Annual Computer, 1990.
  • 10[10]Steven T Eckmann. Eliminating formal flows in automated information flow analysis[J].IEEE,1994:30-38.

共引文献72

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部