期刊文献+

动态多级安全级模型及其应用 被引量:4

Dynamic multilevel security model and its application
下载PDF
导出
摘要 针对采用传统MLS模型实现的系统可用性和灵活性较低的问题,提出了一种基于动态安全级的MLS模型Dynamic MLS。模型使用由流入信息最高安全级和流出信息最低安全级组成的动态安全级代替传统BLP模型中的当前安全级,并依此对主体访问客体的行为进行更灵活的控制。模型在BLP模型11条规则的基础上对其中的5条规则进行了改进,并通过形式化方法证明了改进模型的正确性。最后给出了模型在增加linux系统安全性方面的应用。 This paper gives a multilevel security model based on dynamic security level named Dynamic Multilevel Security (DMLS) model.DMLS uses a couple of dynamic security levels of highest inflow and lowest outflow to replace the current security level of BLP model.With these dynamic security levels,DMLS can control the access of subjects to objects flexibly.In order to use the dynamic security level,DMLS makes a corresponding changes to the five of eleven rules of classic BLP model and the model is proved to be correct through formal methods.At last an application of DMLS to enhance security of linux is given.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第14期100-102,共3页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)No.2006AA01Z40~~
关键词 多级安全性(MLS) 安全模型 动态安全级 Multi-Level Security(MLS) security model dynamic security level
  • 相关文献

参考文献5

  • 1Bell D E,La Padula L J.Secure computer system:Unified exposition and muhics interpretation[R].MITRE Corporation,2Bedford,Mass, 1976.
  • 2Gasser M.Building a secure computer system[M].New York:Van Nostrand Reinhold Company,1988.
  • 3Ott A.Regel-basierte zugriffskontrolle nach dem generalized framework for access controlansatz am beispiel linux [D].Diplomarbeit Universitat Hamburg, 1997.
  • 4季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 5李瑞轩,赵战西,王治纲,卢正鼎.一种基于访问历史的BLP模型[J].计算机科学,2006,33(7):286-288. 被引量:4

二级参考文献28

  • 1Bell D E,LaPadula L J. Secure computer system: Unified exposition and MULTICS interpretation: [Tech Rep]. The MITRE Corporation, MTR-2997 Revision 1,1976
  • 2Gligor V D,Burch E L,Chandersekaran C S, et al. On the design and the implementation of secure Xenix work stations. In: Proc.of the 1986 IEEE Symposium on Security and Privacy. Oakland,California: IEEE Computer Society Press, 1986. 102-117
  • 3Lin T Y. Bell and LaPadula axioms: A "new" paradigm for an"old" model. In.. Proc. 1992 ACM SIGSAC New Security Paradigms Workshop. Little Compton, Rhode Island, USA, 1992. 82-93
  • 4Denning D E. A lattice model of secure information flow. Communications of the ACM, 1976,19(5) : 236-243
  • 5Bell D E. Secure computer systems: A network interpretation.In: Proceedings of the 2nd Aerospace Computer Security Conference, McLean, 1986, 32-39
  • 6Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
  • 7Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
  • 8Mayer FL. An interpretation of refined Bell-LaPadula model for the TMach kernel. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 368-378.
  • 9Lunt T, Denning D, Schell R, Heckman M, Shockley W. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593-607.
  • 10Bell DE, La Padula LJ. Secure computer system: Unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1,1976.

共引文献35

同被引文献22

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部