期刊文献+

带时间特性的BLP模型及其在Linux上的设计与实现 被引量:2

Design and Implementation of BLP with Time Character on Linux
下载PDF
导出
摘要 BLP(Bell&LaPadula)模型是用来在计算机系统内实施多级安全政策和自主安全政策的一种访问控制模型。本文将系统时间看成一个基本的安全要素,提出了带时间特性的BLP模型(BLP with Time Character:记为BLP—T),并将之形式化。BLP—T解决了主客体安全标记随时间的变化问题,以及主体可自主地决定其他的哪些主体可以在何时访问他拥有的客体。最后,将BLP—T应用于Linux,得到了一个原型。实验证明,该原型可以实现主客体安全标记时间特性、主体对客体的时间约束。BLP—T使得BLP模型呈现出环境敏感性。 BLP(Bell&LaPadula)model is used to implement Multi-Level Security Policy (MLS)and Discretionary Access Control Policy(DAC)in computer system. In this paper, system time is look as a basic secure element, BLP-T (BLP with Time Character)is presented, and formalized. BLP-T resolves problems that secure labels of subject and object are changed along with time, and that the subject discretionarily decides that who, by when, can access his owns objects. Finally,BLP-T is implemented on Linux,and gain a demo. It is proved that this demo can realize time character of secure labels and time constraint between subject and object. BLP- T makes the BLP model take on environment sensitivity.
作者 谭良 周明天
出处 《计算机科学》 CSCD 北大核心 2007年第5期92-95,共4页 Computer Science
基金 国家863宽带VPN项目863-104-03-01课题资助 2003年度四川省科技攻关项目03GG007-007资助
关键词 信息安全 访问控制 BLP 带时间特性的BLP 时间约束 Information security, Access control, BLP, BLP with time character, Time constraint
  • 相关文献

参考文献12

  • 1Bell DE,Lapadula LJ.Secure computer systems:unified exposition and multics interpretation[J].MITRE Corp,1976,MTR2997-3130
  • 2Branstad D.Data Categorization and Labeling (executive summary)[C].In:Proceedings of the 13th National Computer Security Conference.Washington:NIST Press,1990.32~33
  • 3George F,Meade G.Department of Defense Trusted Computer System Evaluation Criteria[J].Department of Defense Computer Security Center,MD 20755,1983.382~443
  • 4Gligor VD,Burch EL,Chanderskaranetal CS.On the design and the implementation of secure Xenix work stations[C].In:Proc.of the 1986 IEEE Symposium on Security and Privacy.Oakland,California.IEEE Computer Society Press,1986.102~117
  • 5Gligor VD,Chandersekaran CS,Chapman RS,et al.Design and implementation of secure Xenix[J].IEEE Transactions on Software Engineering,1987,SE-13(2):208~221
  • 6Sandlu R S.Lattice-Based Access Control Model[J].IEEE,1993
  • 7谭良,罗讯,周明天.动态多级安全系统安全标记的格模型[J].电子科技大学学报,2004,33(4):442-445. 被引量:2
  • 8石文昌,孙玉芳,梁洪亮.经典BLP安全公理的一种适应性标记实施方法及其正确性[J].计算机研究与发展,2001,38(11):1366-1372. 被引量:28
  • 9石文昌,孙玉芳.多级安全性政策的历史敏感性[J].软件学报,2003,14(1):91-96. 被引量:19
  • 10梁洪亮,孙玉芳,赵庆松,张相锋,孙波.一个安全标记公共框架的设计与实现[J].软件学报,2003,14(3):547-552. 被引量:16

二级参考文献27

  • 1莫瑞 加瑟 吴亚非等(译).计算机安全的技术与方法[M].北京:电子工业出版社,1992..
  • 2国家质量技术监督局.计算机信息系统安全保护等级划分准则.GB17859-1999[M].北京:中国标准出版社,1999..
  • 3[1]D E Bell, L J LaPadula. Secure computer system: Unifiedexposition and MULTICS interpretation. The MITRECorporation, Tech Rep: MTR-2997 Revision 1, 1976
  • 4[2]T Y Lin. Bell and LaPadula axioms: A "new" paradigm for an"old" model. In: Proc 1992 ACM SIGSAC New SecurityParadigms Workshop. Little Compton, Rhode Island, USA,1992. 82~93
  • 5[3]V D Gligor, E L Burch, C S Chandersekaran et al. On thedesign and the implementation of secure Xenix workstations.In: Proc of the 1986 IEEE Symposium on Security andPrivacy. Oakland, California: IEEE Computer Society Press,1986. 102~117
  • 6[4]II C W Flink, J D Weiss. System V/MLS labeling andmandatory policy alternatives. AT&T Technical Journal,1988, (5/6): 53~64
  • 7[5]G L Grenier, R C Holt, M Funkenhauser. Policy vsmechanism in the secure TUNIS operating system. In: 1989IEEE Symposium on Security and Privacy. Oakland,California: IEEE Computer Society Press, 1989. 84~93
  • 8[6]P A Karger, M E Zurko, D W Bonin et al. A VMM securitykernel for the VAX architecture. In: 1990 IEEE ComputerSociety Symposium on Research in Security and Privacy.Oakland, California: IEEE Computer Society Press, 1990. 2~19
  • 9[7]N A Waldhart. The army secure operating system. In: 1990IEEE Computer Society Symposium on Research in Securityand Privacy. Oakland, California: IEEE Computer SocietyPress, 1990. 50~60
  • 10[8]DoD 5200.28-STD, Department of Defense Trusted ComputerSystem Evaluation Criteria. Department of Defense.Washington, DC, 1985

共引文献106

同被引文献13

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部