期刊文献+

多级安全的分布式管理和动态行为 被引量:1

Distributed management and dynamic behavior for multi-level security
下载PDF
导出
摘要 传统的多级安全模型和在模型指导下设计出来的多级安全系统存在集中式管理和缺乏明确的动态管理机制这两个重要问题.本文研究了多级安全的分布式管理体系和动态多级安全管理策略.给出一个基于域的多级安全分布式管理模型,该模型集成了域分离、域隔离和域冗余的域管理安全策略.着重讨论了多级安全的动态行为和规范这些行为的安全管理策略.分别论证了所提出的安全策略的有效性和可行性. The centralized management and lack of dynamic multi-level security policies are two important limitations of the traditional multi-level security models and the real systems designed in light of them. This paper studies the distributed management and dynamic behavior for multi-level security. A domain-based distributed management model for multi-level security is presented. Several dynamic multi-level security policies are discussed. All the proposed security policies and present the corresponding implementation mechanism are analyzed.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2007年第3期427-430,共4页 Journal of Harbin Institute of Technology
基金 国家"十五"国防预研基金资助项目(41316.1.2) 国家教育部博士点基金资助项目(20020213017)
关键词 多级安全 安全管理策略 多级安全动态管理 域管理 安全模型 multi-level security security policy dynamics of multi-level security domain management security model
  • 相关文献

参考文献9

  • 1SPENCER R,SMALLEY S,LOSCOCCO P,et al.The flask security architecture:system support for diverse security policies[C]//Proceedings of the 8th USENIX Security Symposium.Berkeley,CA:USENIX Press,1999:123 -139.
  • 2LOSCOCCO P,SMALLEY S.Integrating flexible support for security policies into the Linux operating system[M].Technical Report,NSA and NAI labs,2001.
  • 3BELL D E,LAPADULA L J.Secure computer system:unified exposition and multics interpretation[M].Technical Report,The MITRE Corporation,1976.
  • 4GLIGOR V D,CHANDERSEKARAN C S,CHAPMAN A S,et al.Design and implementation of secure Xenix[J].IEEE Transactions on Software Engineering,1987,13(2):208 -221.
  • 5FLINK Ⅱ C W,WEISS J D.System V/MLS labeling and mandatory policy alternatives[J].AT & T Technical Journal,1988,(5/6):53 -64.
  • 6GRENIER G L,HOLT R C,FUNKENHAUSER M.Policy vs mechanism in the secure TUNIS operating system[C].Proceedings of the 1989 IEEE Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press.1989:84-93.
  • 7WALDHART N A,The army secure operating system[C]//Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,1990,50-60.
  • 8ABRAMS D,JAJODIA S,PODELL J.Information security an integrated collection of essays[M].Los Alamitos,CA:IEEE Computer Society Press,1995.
  • 9CASTANO S,FUGINI M G,MARTELLA G,et al.Database security[M].Boston,US:Addison-Wesley and ACM Press,1995.

同被引文献9

  • 1胡钢,谢冬梅,吴元忠.无线传感器网络路由协议LEACH的研究与改进[J].传感技术学报,2007,20(6):1391-1396. 被引量:67
  • 2Chen Hongsong,Ji Zhenzhou,Hu Mingzeng.An efficient security agent scheme for AODV routing protocol based on thread state transition[].Asian Journal of Information Technology.2006
  • 3Chien Chung Su,Ko Ming Chang,Yau Hwang Kuo.The new intrusion prevention and detection approaches for clustering-based sensor networks[].IEEE Communications Society/WCNC.2005
  • 4Sencun Zhu,Sanjeev Setia,Sushil Jajodia.LEAP: efficient security mechanisms for large-scale distrib- uted sensor networks[].The th ACM Conference on Computer and Communication Security.2003
  • 5K. Kifayat,M. Merabti,Qi Shi,,D. Llewellyn-Jones.Applying secure data aggregation techniques for a structure and density independent group based key management protocol[].Third International Symposium on Information Assurance and Security.2007
  • 6Wood AD,Stankovic JA.Denial of service in sensor networks[].IEEE Computer.2002
  • 7Douceur J R.The Sybil attack[].Proc of First International workshop on Peer-to-peer systems(IPTPS’ ).2002
  • 8C.Karlof,,D.Wagner.Secure Rerouting in Wireless Sensor Networks:Attacks and Countermeasures[].Elsevier‘s AdHoc Networks Journal.2003
  • 9Johnson C Lee,Victor C. M. Leung,Kirk H. Wong,Jiannong Cao,Henry C. B. Chan.Keymanagement issues in wireless sensor networks: Current protocols and future developments[].IEEE Wireless Communications.2007

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部