期刊文献+

一种新型的层次共享组访问控制模型研究

下载PDF
导出
摘要 本文在分析BLP和BIBA模型的基础上,提出了一种新型的层次共享组访问控制模型。在该模型中提出了动态完整性的概念,同时将完整性和保密性作为不相关的两个特性在模型中存在,使其更加符合现实情况。
作者 宋剑
出处 《魅力中国》 2009年第4期117-117,104,共2页
  • 相关文献

参考文献4

二级参考文献37

  • 1季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 2K.J. Biba. Integrity considerations for secure computer systems.USAF Electronic System Division, Hanscom Air Force Base,Tech. Rep.: ESD-TR-76-372, 1977.
  • 3J.A. Goguen, J. Meseguer. Security policies and security models. The 1982 Symposium on Security and Privacy, Oakland,CA, 1982.
  • 4T. Mayfield. Integrity in automated information system. National Computer Security Center, Technical Report, 1991. 79~ 91.http://www.radium.ncsc.mil/tpep/library/rainbow/C-TR-79-91.ps.
  • 5Joint Technical Committee 1. ISO/IEC 15408-2, 1999.
  • 6P.A. Loscocco, S. D. Smalley, P. A. Muckelbauer, etal. The inevitability of failure: The flawed assumption of security in modern computing environments. In: Proc. the 21st National Information Systems Security Conf. Crytal: National Computer Security Center, 1998. 303~314.
  • 7D. Sutherland. A model of information. The 9th National Security Conf., Gaithersburg, 1986.
  • 8D.D. Clark, D. R. Wilson. A comparison of commercial and military computer security policies. The 1987 IEEE Symposium on Security and Privacy, Oakland, California, 1987.
  • 9D. Brewer, M. Nash. The Chinese wall security policy. In:Proc. of IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1989. 206~214.
  • 10L. Badger, D. F. Sterne, D. L. Sherman, et al. A domain and type enforcement UNIX prototype. USENIX Computing Systems, 1996, 9(1): 47~83.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部