期刊文献+

一个支持可信主体特权最小化的多级安全模型 被引量:14

A Multi-Level Security Model with Least Privilege Support for Trusted Subject
下载PDF
导出
摘要 对已有多级安全模型的可信主体支持进行回顾和分析,提出了DLS(离散标记序列)多级安全模型.该模型将可信主体的生命周期分解为一系列非可信状态,对每一个状态赋予一个敏感标记.可信主体的当前敏感标记等于当前非可信状态的敏感标记,非可信状态的切换由预定义的可信请求事件触发.从而可信主体的当前敏感标记可以根据其应用逻辑而动态调整.同时给出了模型保持系统安全性的安全状态和规则.与Bell模型等可信主体敏感标记范围模型相比,该模型在多级安全的策略范围内实现了可信主体的特权最小化. The trusted subject supports of the existing multi-level security models are reviewed and a new model called DLS (discrete label sequence) is proposed. It decomposes the lifecycle of a trusted subject into a sequence of untrusted states (US). Each untrusted state is associated with a certain current security label, and only the predefined trusted request events (TRE) can trigger the transition from one US to the other. Thus, the current security level of a trusted subject is dynamically changed according to its application's logic. Definitions of secure states and rules to preserve security are also presented. Compared with the trusted subject implemented by security level range, this model gives a better support of least privilege and achieves the support within the MLS policy framework.
出处 《软件学报》 EI CSCD 北大核心 2007年第3期730-738,共9页 Journal of Software
基金 Supported by the National Natural Science Foundation of China under Grant No.60373054(国家自然科学基金) the National High-Tech Research and Development Plan of China under Grant No.2002AA141080(国家高技术研究发展计划(863))
关键词 多级安全 可信主体 最小特权 操作系统安全 multi-level security trusted subject least privilege operating system security
  • 相关文献

参考文献3

二级参考文献30

  • 1国家质量技术监督局.计算机信息系统安全保护等级划分准则.GB17859-1999[M].北京:中国标准出版社,1999..
  • 2Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
  • 3Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
  • 4Mayer FL. An interpretation of refined Bell-LaPadula model for the TMach kernel. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 368-378.
  • 5Lunt T, Denning D, Schell R, Heckman M, Shockley W. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593-607.
  • 6Bell DE, La Padula LJ. Secure computer system: Unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1,1976.
  • 7Schell RR, Tao TF, Heckman M. Designing the GEMSOS security kernel for security and performance. In: Proc. of the 8th National Computer Security Conf. 1985. 108-119.
  • 8Lee TMP. Using mandatory integrity to enforce commercial security. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 140-146.
  • 9Clark DD, Wilson DR. A comparison of commercial and military security policies. In: Proc. of the 1987 IEEE Syrup. on Research in Security and Privacy. IEEE Computer Society Press, 1987. 184-238.
  • 10Rushbyc J. Design and verification of secure systems. ACM Operating Sysstem Review, 1981,15(5):12-21.

共引文献63

同被引文献177

引证文献14

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部