期刊文献+

基于格的可信计算模型 被引量:5

Trusted computing model based on lattice
下载PDF
导出
摘要 为了保障信息的机密性和完整性,对信息的访问和操作,一般需要遵循一定的安全策略。BLP模型只解决了机密性问题,而Biba模型只解决了完整性问题,其他模型也都类似,无法使二者同时兼顾。基于可信模型的敏感标记集合在数学上应形成格的理论,提出了一种融合以上2种模型信息流的格安全模型,可以同时保持信息机密性与完整性。通过构建新的信息流格模型,将推动信息安全模型的理论研究。 In the computer information systems,in general,some security strategies to access and handle information to protect the confidentiality and integrity of information were followed.The BLP model only solved the confidentiality problem,and the Biba model only solved the integrity problem,the others were similar.It couldn’t give attention to both sides at the same time.Based on the set of sensitivity labels for security model coming into being lattice order theory in math,a lattice security model was proposed,which was combined BLP model and Biba model of information flow.The lattice security model could keep the confidentiality and integrity of the information at the same time.The information security model theory research will be developed through the constructing of the new model of information flow lattice.
作者 马新强 黄羿
出处 《通信学报》 EI CSCD 北大核心 2010年第S1期105-110,共6页 Journal on Communications
基金 国家自然科学基金资助项目(90718009) 贵州省国际科技合作计划基金资助项目(黔科合外G字[2010]7026号) 贵州省科学技术基金项目(黔科合J字[2010]2104) 重庆文理学院项目基金资助项目(Y2009JS57 68 69)~~
关键词 可信计算模型 BLP模型 BIBA模型 trusted computing model lattice BLP model Biba model
  • 相关文献

参考文献10

  • 1刘彦明,董庆宽,李小平.BLP模型的完整性增强研究[J].通信学报,2010,31(2):100-106. 被引量:17
  • 2张俊,周正,李建,刘毅.基于MLS策略的机密性和完整性动态统一模型[J].计算机工程与应用,2008,44(12):19-21. 被引量:13
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:357
  • 4李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 5LIPNER S B.Nondiscretionary controls for commercial applica-tions. Proc IEEE Symp.Security and Privacy . 1982
  • 6S Osborn.Mandatory access control and role-based access control revisited. Proc the Second ACM Workshop on Role Based Access Control . 1997
  • 7Denning DE.A lattice model of secure information flow. Communications of the ACM . 1976
  • 8Bell DE,LaPadula LJ.Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244 . 1973
  • 9Bell D E,LaPadula L J.Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report ESD-TR-75-306 . 1976
  • 10Biba KJ.Integrity Considerations for Secure Computer Systems. Technical Report, ESD-TR-76-372 . 1977

二级参考文献29

共引文献395

同被引文献84

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部