期刊文献+

一种主体行为可信度量模型 被引量:5

Trustworthiness Measuring Model for Subject’s Behaviors
下载PDF
导出
摘要 提出一种针对计算机信息系统的主体行为进行可信度量的模型,给出模型的一个实现框架。该模型可以对主体的行为进行可信度量,根据主体行为的可信度使不合法程序和代码无法执行、合法程序和代码无法执行未授权访问,使合法程序和代码的可疑行为受到严格控制,并能根据不同阈值来保证安全性和实用性的合理折中。 A model to measure the trustworthiness of subject’s behaviors is presented, and a frame to realize the model function is given. The principle to measure the trustworthiness of subject’s behaviors is expatiated, which controls suspicious behavior of legal programs and codes. According to the trustworthiness measured out by the model, it can forbid the running of illegal programs and codes, and the unauthorized access of legal programs and codes. It discusses how to get a trade-off between security and practicability with certain security threshold values.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第7期35-37,共3页 Computer Engineering
基金 国家“863”计划基金资助项目(2002AA1Z2101)
关键词 执行清单 执行描述 可信度量 安全门限 implementation list implementation description trustworthiness measuring security threshold value
  • 相关文献

参考文献5

  • 1Barrantes E G. Acldey D H, Forrest S, et al. Randomized InstruCtion Set Emulation to Disrupt Binary Code Injection Attacks[C].Proc. of CCS'03. [S. l.]: ACM Press, 2003.
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3Bell D E, LaPadula L J. Secure Computer Systems: A Mathematical Model[R]. The MITRE Corporatoin, Technical Report: M74-244, 1973.
  • 4Biba K J. Integrity Considerations for Secure Computer System[R]. PSAF Electronic System Division, Hanscom Air Force Base, Technical Report: ESD-76-372, 1977.
  • 5ZHOU Zheng,ZHANG Jun,LI Jian,LIU Yi.Protecting Terminals by Security Domain Mechanism Based on Trusted Computing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1437-1440. 被引量:5

二级参考文献14

  • 1陈泽茂,沈昌祥.基于操作系统安全的计算机病毒防御策略[J].武汉理工大学学报,2004,26(9):75-77. 被引量:4
  • 2Bell D E,LaPadula L J.Secure computer systems:A mathematical model.Technical Report M74-244,The MITRE Corporatoin.1973
  • 3Biba K J.Integrity considerations for secure computer system.Technical Report,ESD-76-372,Bedford.MA:PSAF Electronic System Division,Hanscom Air Force Base,1977
  • 4Denning D.A Lattics model of secure information flow.Commnication of The ACM,1976,19(5):236~250
  • 5Goguen J A,Meseguer J.Security policy and security models.In:Proceedings of the 1982 IEEE Symposium on Security and Privacy.11-20,1982
  • 6Adleman L M.An Abstract Theory of Computer Viruses[].Lecture Notes in Computer Science.1990
  • 7Cui Sheng.Where Will Information Security be Oriented and Terminal Security Brings Up Trusted Computing. http://linux.ccidnet.com/art/35/20060105/ 407977-1.html . 2006
  • 8General Administration of Quality Supervision,Inspection and Quarantine of the People’’s Republic of China.Information System Security Assurance Criterion ( Draft)[].TC- NE-Banking.2004
  • 9Telecom and Information Technology Security . 2003
  • 10Zemao,Chen. Research on Security Architecture of Secure Operating System for Malicious Code Defending . 2005

共引文献21

同被引文献57

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部