期刊文献+

信息安全模型安全控制研究 被引量:6

Research on security control of information security model
原文传递
导出
摘要 随着计算机网络的发展,信息越来越开放,但信息安全也暴露出越来越多的问题。文中分析了几种典型的信息安全模型。针对模型中存在的安全隐患,对访问控制机制做了改进,引入主体身份鉴别、访问记录、子存储空间等措施来控制访问,有效地提高了信息的安全性。 With the development of computer network, people have to deal with the insecurity of information that caused by the opening of information. In this paper, we analyze some typical information security models. We improve upon the access control mechanism to enhance the access security by using agent identity discrimination, access recorder, sub-storage pool and so on for those hidden trouble in the models and we amend some effectively.
作者 袁皓 杨晓懿
出处 《信息安全与通信保密》 2007年第2期78-80,共3页 Information Security and Communications Privacy
关键词 信息安全模型 BLD模型 访问控制 information security model BLP model access control
  • 相关文献

参考文献6

  • 1王宇,吴忠望,卢昱.信息网络安全控制[J].计算机工程与设计,2005,26(12):3183-3186. 被引量:14
  • 2[4]ISO/IEC JTC 1/SC27 N2401.Information technology-Security techniques.Secretariat:DIN,Germany.
  • 3[5]David E.Bell and Leonard J.LaPadula.Secure Computer Systems Mathematical Foundations.ESD-TR-73-278,Vol.Ⅰ,AD 770 768,Electronic Systems Division,Air Force Systems Command,Hanscom Air Force Base,Bedford,MA,USA,1973.
  • 4[6]David E.Bell and Leonard J.LaPadula.Secure Computer Systems:A Mathematical Model.ESD-TR-73-278,Vol.Ⅱ,AD 771 543,Electronic Systems Division,Air Force Systems Command,Hanscom Air Force Base,Bedford,MA,USA,1973.
  • 5[9]Security Architecture,Standards and Guidelines by Nebraska Information Technology Commission http://www.nitc.state.ne.us/standards/
  • 6[10]Butler W.Lampson.A Note on the Confinement Problem.Communications of the ACM,1973,16(10):613-615.

二级参考文献4

共引文献13

同被引文献28

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部