期刊文献+

机密性与完整性结合函数的读写规则性质研究

Read-Write Rule Property Research of the Combined Function About the Confidentiality and Integrality
下载PDF
导出
摘要 通过对信息安全的机密性和完整性的结合函数的读写规则的分析可见:结合函数有机地整合了信息安全的机密性和完整性,同时考虑了人们对机密性和完整性的关心程度,其对应的读写规则是对BLP模型和Biba模型读写规则有机结合,是BLP模型和Biba模型的读写规则的推广. To analysis the reads and write rule of the combined function of the confidentiality and integrality of the information security, it is clear that the combined function integrates the confidentiality and integrality of the information security , and the concerning degree of confidentiality and integrality by people is also considered at the same time. The reads and write rule are the combination and the expansion of reads and write rule of the model of BLP and the model of Biba.
作者 刘益和
出处 《内江师范学院学报》 2007年第6期36-38,共3页 Journal of Neijiang Normal University
基金 四川省教育厅自然科学重点项目(2006A130) 内江师院院级科研项目:06NJZ-5.
关键词 信息安全 结合函数 读写规则 information security combined function read-write rule
  • 相关文献

参考文献5

  • 1[1]Bell D E,Lapadula LJ.Secure compter system:mathematical foundation[R].MTR-2527,Mitre corp,Bedford,MA,1973(NTIS AD-771543).
  • 2[2]Biba,K.Integrity Considerations for Secure Computing Systems[R].Mitre Report MTR-3153,Mitre Corporation,Bedford,MA,1975.
  • 3[3]Denning D E.A lattice model of secure information flow[J].Communication ACM,1976,19(5):236-243.
  • 4蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 5[5]Yihe Liu,Xingshu Chen.A New Information Security Model Based On BLP Model And Biba Model[A].YUAN Baozong etc.20047th International Conference on Signal Processing[C].Beijing:House of Electronics Industry,IEEE PRESS.2004:2643-2646.

二级参考文献4

  • 1Bell D.E., Lapadula L.J.. Secure computer systems. Mitre Corporation, Bedford, MA, USA: Technical Report MTR-2547 (Vol Ⅰ-Ⅲ), 1973
  • 2Biba K.J.. Integrity considerations for secure computer systems. Mitre Corporation, Bedford, MA, USA: Technical Report MTR-3153, 1977
  • 3Di Vito Ben L., Palmquist P.H., Anderson E.R., Johnston M.L.. Specification and verification of the ASOS kernel. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, 1990, 61~74
  • 4Waldhart N.A.. The army secure operating system. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, 1990, 50~60

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部