期刊文献+

一种改进的Clark-Wilson完整性策略模型 被引量:1

An Improvement of Clark-Wilson Integrity Model
下载PDF
导出
摘要 Clark-Wilson完整性策模型在商业安全领域可以有效满足企业信息系统所追求的完整性安全需求。但是直接将用户和权限关联,给权限的管理带来不便;对权限不加以时间约束,会带来安全隐患;在用户同谋的情况下,模型还会失效。基于上述缺陷,在用户和权限之间引入角色的概念,用户可以在受约束的情况下激活自己拥有的角色从而获得相应的权限,使Clark-Wilson完整性策略模型更具有安全特性。 In commerce security field, Clark-Wilson integrity model can meet integrity need of enterprise information system. But it associated user with permission directly, so it is very difficult to manage permissions; the permissions are not restricted by the time, which may bring safe problems; if the users collude together, the model will be invalidation. For the above limitations, Clark-Wilson integrity model will have more safety characteristic by importing the role between users and permissions when user can activate roles under some constraints.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第7期128-131,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(10571112) 陕西省自然科学基金项目(2006F27)
关键词 Clark—Wilson完整性策略模型 角色 时间束 职责分离 条件约束 Clark-Wilson integrity model role separation of duty time constraint condition constraint
  • 相关文献

参考文献4

二级参考文献19

  • 1Seiden, KF, Melanson JP. The auditing facility for a VMM security kernel. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1990. 262-277.
  • 2Simone FH. IT-Security and Privacy. Berlin: Springer-Verlag, 2001. 35-104.
  • 3Bishop M. A model of security monitoring. In: IEEE 5th Annual Computer Security Applications Conf. New York: IEEE Computer Society Press, 1990. 46-52.
  • 4National Computer Security Center. A guide to understanding audit in trusted systems, Version 2. Technical Report, NCSC-TG-001, Fort Meade: National Computer Security Center, 1988.
  • 5Clark DD, Wilson DR. A comparison of commercial and military computer security policies. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1987. 184-194.
  • 6Ozsu MT, Valduriez P. Principle of Distributed Database Systems. 2nd ed., Upper Saddle River: Prentice Hall, 1989. 25-51.
  • 7Denning DE, Lunt TF. A multilevel relational data model. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1990. 220-234.
  • 8Woodcock J, Davies J. Using Z. Upper Saddle River: Prentice Hall, 1996.
  • 9Picciotto J. The design of an effective auditing subsystem. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1987. 13-22.
  • 10Markantonakis C. Secure logging mechanisms for smart card [Ph.D. Thesis]. Egham: University of London, 1999.

共引文献10

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部