期刊文献+

对两个改进的BLP模型的分析 被引量:22

Analysis of Two Improved BLP Models
下载PDF
导出
摘要 安全性和灵活性是各种改进的BLP模型追求的目标.如何在保持安全性的前提下增加BLP模型的灵活性,一直是安全操作系统研究人员研究的重点.安全模型是系统设计的基础,如果在系统中实现了不安全的“安全模型”,其后果是严重的.结合多级安全(MLS)的核心思想,通过实例列举的方式深入分析了两个改进的BLP模型——DBLP(dynamic BLP)和SLCF(security label common framework).尽管这两个模型都提出了在系统运行时动态地调整主体安全级的规则,但是分析表明,它们还是不安全的.在这两个模型的规则控制下,特洛伊木马可以通过显式地读和写操作将高安全等级的信息泄漏给低安全等级的主体,从而违反了多级安全(MLS)策略.研究结果为人们避免选用不安全的模型提供了有意义的理论支持. The security and flexibility are two goals that various improved BLP models attempt to achieve. How to enhance the flexibility of BLP model is a challenging problem that security researchers try to solve. However, the implementation of an insecure "security model" in the system will result in an insecure system. In this paper, two improved BLP models, for short DBLP (dynamic BLP) and SLCF (security label common framework), are analyzed. Although the designers of the two models claimed that their proposals can adjust the security level of the untrusted subject dynamically and accordingly improve the flexibility of the classical BLP model, the analytic results show that the two improved models are not secure at all. Under the rules of the two improved models a Trojan horse can "legally" read the high-level information and then write them to low-level objects, which violate the principle of multi-level security (MLS). This effort provides a theoretical foundation for avoiding the choice of insecure MLS model.
出处 《软件学报》 EI CSCD 北大核心 2007年第6期1501-1509,共9页 Journal of Software
基金 国家自然科学基金No.60573042 国家重点基础研究发展计划(973)No.G1999035802 北京市自然科学基金 No.4052016~~
关键词 安全性 灵活性 BLP模型 特洛伊木马 信息流 security flexibility BLP model Trojan horse information flow
  • 相关文献

参考文献2

二级参考文献22

  • 1Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
  • 2Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
  • 3Mayer FL. An interpretation of refined Bell-LaPadula model for the TMach kernel. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 368-378.
  • 4Lunt T, Denning D, Schell R, Heckman M, Shockley W. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593-607.
  • 5Bell DE, La Padula LJ. Secure computer system: Unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1,1976.
  • 6Schell RR, Tao TF, Heckman M. Designing the GEMSOS security kernel for security and performance. In: Proc. of the 8th National Computer Security Conf. 1985. 108-119.
  • 7Lee TMP. Using mandatory integrity to enforce commercial security. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 140-146.
  • 8Clark DD, Wilson DR. A comparison of commercial and military security policies. In: Proc. of the 1987 IEEE Syrup. on Research in Security and Privacy. IEEE Computer Society Press, 1987. 184-238.
  • 9Rushbyc J. Design and verification of secure systems. ACM Operating Sysstem Review, 1981,15(5):12-21.
  • 10Bell DE. Security policy modeling for the next-generation packet switch. In: Proc. of the IEEE Symp. on Security and Privacy.IEEE Computer Society Press, 1988. 212-216.

共引文献41

同被引文献182

引证文献22

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部