期刊文献+

安全访问的轻量级完整性模型研究及实施 被引量:1

Research and implementation of light weight integrity model on security access
下载PDF
导出
摘要 对传统的完整性模型进行了分析,并对其完整性给予形式化描述。在此基础上,提出了轻量级的Clark-Wilson模型,并给出了其在安全增强操作系统SELinux中的实施。 This paper analyzed and formalized these classical integrity models. A light weight Clark-Wilson' s model was proposd on above basis and describes its implement on SELinux.
出处 《计算机应用研究》 CSCD 北大核心 2007年第8期173-175,183,共4页 Application Research of Computers
基金 陕西省自然科学基金资助项目(2004f28)
关键词 机密性 完整性 SELINUX 轻量级模型 confidentiality integrity SELinux( security-enhanced Linux) light weight model
  • 相关文献

参考文献10

  • 1BIBA K J.Integrity considerations for secure computer systems,Technical Report MTR-3153[R].Bedford,MA:Mitre Corporation,Mitre Corp,1975.
  • 2National Security Agency.Security-enhanced linux[EB/OL].http://www.nsa.gov/selinux/.
  • 3BELL D,PADULA L L.Secure computer systems,mathematical foundations,technical report ESD-TR-73-278[R].[S.l.]:Mitre Corp,1973.
  • 4Tresys Corporation.SETools policy tools for SELinux[EB/OL].http://www.tresys.com/selinux/selinux policy tools.shtml.
  • 5CLARK D,WILSON D R.A comparison of commercial and military computer security policies[C]//Proc of the IEEE Symposium on Security and Privacy.[S.l.]:IEEE Computer Society Press,1987:184-238.
  • 6JAEGER T,EDWARDS A,ZHANG Xiao-lan.Policy management using access control spaces[J].ACM Transactions on Information and System Security,2003,6(3):327-364.
  • 7JAEGER T,SAILER R,ZHANG Xiao-lan.Analyzing integrity protection in the SELinux example policy[C]//Proc of the 12th USENIX Security Symposium.2003.
  • 8DENNING D E.A lattice model of secure information flow[J].Communications of the ACM,1976,19(5):236-243.
  • 9LI Peng,ZDANCEWIC S.Downgrading policies and relaxed noninterference[C]//Proc of the Symposium on Principles of Programming Languages.New York:ACM Press,2005.
  • 10斯汉,温红子,雷浩,王建.基于Clark-Wilson完整性策略的安全监视模型[J].软件学报,2004,15(8):1124-1132. 被引量:6

二级参考文献13

  • 1Seiden, KF, Melanson JP. The auditing facility for a VMM security kernel. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1990. 262-277.
  • 2Simone FH. IT-Security and Privacy. Berlin: Springer-Verlag, 2001. 35-104.
  • 3Bishop M. A model of security monitoring. In: IEEE 5th Annual Computer Security Applications Conf. New York: IEEE Computer Society Press, 1990. 46-52.
  • 4National Computer Security Center. A guide to understanding audit in trusted systems, Version 2. Technical Report, NCSC-TG-001, Fort Meade: National Computer Security Center, 1988.
  • 5Clark DD, Wilson DR. A comparison of commercial and military computer security policies. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1987. 184-194.
  • 6Ozsu MT, Valduriez P. Principle of Distributed Database Systems. 2nd ed., Upper Saddle River: Prentice Hall, 1989. 25-51.
  • 7Denning DE, Lunt TF. A multilevel relational data model. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1990. 220-234.
  • 8Woodcock J, Davies J. Using Z. Upper Saddle River: Prentice Hall, 1996.
  • 9Picciotto J. The design of an effective auditing subsystem. In: IEEE Symp. on Security and Privacy. New York: IEEE Computer Society Press, 1987. 13-22.
  • 10Markantonakis C. Secure logging mechanisms for smart card [Ph.D. Thesis]. Egham: University of London, 1999.

共引文献5

同被引文献5

  • 1Daniel P.Bovet,Marco Cesati.深入理解Linux内核[M].第3版.陈莉君,张琼声,张宏伟译.北京:中国电力出版社,2007.
  • 2http://lxr.linux.no/.
  • 3GB17859-1999.计算机信息系统安全保护等级划分准则[S].[S].,1999..
  • 4毛德操 胡希明.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2001..
  • 5Robert Love.Linux内核设计与实现[M].陈莉君,等译.北京:机械工业出版社,2006:31-32.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部