期刊文献+

LogicSQL多级安全数据库的研究与实现 被引量:1

Research and Implementation of LogicSQL Multilevel Security Database
下载PDF
导出
摘要 结合数据库的用户身份认证与自主访问控制研究,设计了LogicSQL多级安全模型。该模型把安全级分为分层密级和非分层的范围组成的二元组形式,主要从安全标签、强制访问控制和审计方面进行讨论。该模型在企业搜索与公安系统中得到应用。 A multilevel security mpdel of LogicSQL database, which is based on user identifier, discretionary access control(DAC) of database, is designed. Multilevel security model requires that all users and resources are classified and assigned a security label, which is a combination of a hierarchical security level and non - hierarchical security categories. Discussed a few aspects of LogicSQL multilevel security model ,including LogicSQL label, mandatory access control (MAC), and audit. The model is applied in enterprise search and police system.
出处 《计算机技术与发展》 2007年第3期156-158,162,共4页 Computer Technology and Development
基金 贵州省优秀科技教育人才省长专项基金项目(黔省专合字(2005)88号)
关键词 LOGICSQL 强制访问控制 多级安全模型 LogicSQL mandatory access control multilevel security model
  • 相关文献

参考文献6

  • 1Department of Defense (DOD).Trusted Computer System E valuation Criteria (TCSEC)[M].Fort Meade,MD:Department of Defense,1985.
  • 2Yuan Li -Yan.The Documentation of LogicSQL[D].Canada:Alberta University,2005.
  • 3袁晓东,冯颖.B1级数据库管理系统强制存取控制模型研究[J].计算机学报,2000,23(10):1096-1101. 被引量:24
  • 4Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based access control models[J].IEEE Computer,1996,29 (2):38 -47.
  • 5Sandhu R S,Chen F.The Multilcvcl Relational(MLR)Data Mode[J].ACM Transactions on Information and System Security,1998,1 (1):1-26.
  • 6Levinger J.Oracle Label Security Administrator's Guide[M].Release 2(9.2).[s.l.]:[s.n.],2002.

二级参考文献3

  • 11,Pfleeger C P. Security in Computing, Edition 2. Prentice-Hall, 1997
  • 22,Gallagher P R. Security of electronic information. The National Computer Security Center: Technique Report NCSC-TG-021, 1991
  • 33,Castano S, Fugini M, Martella G et al. Database Security. ACM Press & Addison-Wesley, 1994

共引文献23

同被引文献13

  • 1ISO/IEC 15408-2-2009.Common criteria for informationtechnology security evaluation[Z/OL].(2012-08-27),http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R2.pdf.
  • 2Anderson R J,Stajano F,Lee J H.Security policies[J].Advances in Computers,2001,55:185-235.
  • 3Bell D E,LaPadula L J.Secure computer system:Mathematical foundations and model[J].Journal ofComputer Security,1996,4(2/3):229-263.
  • 4Goguen J A,Meseguer J.Security policies and securitymodels[C] //Proceedings of the 1983IEEE Symposium onSecurity and Privacy.Oakland,USA:IEEE ComputerSociety Press,1982:11-20.
  • 5Freeman J W,Neely R B.On security policy modeling[C] //Proceedings of the 1993IEEE International Conferenceon Robotics and Automation.Atlanta,USA:IEEEComputer Society Press,1993:61-69.
  • 6McLean J D,Landwehr C E,Heitmeyer C L.A formalstatement of the MMS security model[C] //Proceedings ofthe 1984IEEE Symposium on Security and Privacy.Oakland,USA:IEEE Computer Society Press,1984:188-194.
  • 7Keller R M.Formal verification of parallel programs.[J].Communications of The ACM,1976,9(7):371-384.
  • 8Chow T S.Testing software design modeled by finite-statemachines[J].IEEE Transactions Software Engineering,1978,4(3):178-187.
  • 9Sabnani K K,Dahbura A T.A protocol test generationprocedure[J].Computer Networks and ISDN Systems,1988,15(4):285-297.
  • 10Sidhu D P,Leung T K.Formal methods for protocol testing:A detailed study[J].IEEE Transactions SoftwareEngineering,1989,15(4):413-426.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部