期刊文献+

Formal Analysis on an Extended Security Model for Database Systems

Formal Analysis on an Extended Security Model for Database Systems
下载PDF
导出
摘要 In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient. In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期519-522,共4页 武汉大学学报(自然科学英文版)
基金 the National High Technology Research and Development Program of China (2006AA01Z430)
关键词 Bell-LaPudula (BLP) model security model COQ integrity constraints Bell-LaPudula (BLP) model security model Coq integrity constraints
  • 相关文献

参考文献3

二级参考文献47

  • 1季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 2Denartment of Defense Standard.Department of defense trusted comouter system evaluation criteria.DOD 5200.28-STD,1985.
  • 3National Compmer Security Center.Trusted database interpretation of the trusted computer systems evaluation criteria.NCSC—TG-021,National Computer Security Center,1991.
  • 4The International Organization for Standardization.Common criteria for information technology security evaluation.ISO/IEC 15408:1999(E),1999.
  • 5Bell DE,LaPadula LJ.Secure computer systems:Unified exposition and multics interpretation.Technical Report,MTR-2997,Bedford,MITRE Corporation,1976.
  • 6Gong L,Qian XL.Enriching the expressive power of security labels.IEEE Transactions on Knowledge and Data Engineering,1995,7(5):839-841.
  • 7Foley SN,Gong L,Qian XL.A security model of dynamic labeling providing a tiered approach to verification.In:Proceedings of the IEEE Symposium on Security and Privacy.Oakland,1996.142~153.
  • 8Sandhu R,Chen F.Themultilevel relational(MLR)data model.ISSE-TR-95-101,George Mason University,1995.
  • 9Pernul G.Tioa AM,Winiwarter W.Modeling data secrecy and integrity.Data & Knowledge Engineering,1998,26:291~308.
  • 10Atluri V,Jajodia S,Keefe TF,McCollum C,Mukkamala R.Multilevel Secure transaction processing:Status and prospects Database Security X:Status and Prospects.London:Chapman & Hall,1997.79~98.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部