期刊文献+

多级安全系统中数据聚合的无干扰属性

Non-interfere property of data aggregation in multi-level security system
下载PDF
导出
摘要 基于信息流的安全模型较访问控制模型优势在于更本质的描述了什么是安全,自提出信息流的无干扰概念以来信息流模型就成为安全研究的中心之一,并提出了很多种无干扰模型。针对现存几种安全模型存在建模工具与分析工具不一致、不支持多级安全系统等问题。在广义无干扰模型以及聚合属性的基础上提出一种支持多级安全系统、多等级信息流策略状态转换且包含聚合属性的信息流安全模型,并给出了信息流策略的正式语义。 Compared with security models based on access control, security models based on information flow theory are more fundamental to capture the essentials of what is confidentiality. Since the definition of the concept of non-interference, varitations of non-interference models are presented. According to the existing security model existence of moden tools and analysis tools are inconsistent and does not support multi-level security system. A flow model that support multi-level security system and data aggregation based on wild Non-interfere model and aggregation properties is presented. Finally, a semantice for those information flow policies is given.
作者 张洪军 虞俊
机构地区 江苏大学
出处 《计算机工程与设计》 CSCD 北大核心 2009年第21期4848-4850,4952,共4页 Computer Engineering and Design
关键词 数据聚合 信息流 无干扰 多级安全 安全模型 date aggregation information flow non-interference multi-level security security model
  • 相关文献

参考文献2

二级参考文献21

  • 1季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 2Bell D.E., Lapadula L.J.. Secure computer systems. Mitre Corporation, Bedford, MA, USA: Technical Report MTR-2547 (Vol Ⅰ-Ⅲ), 1973
  • 3Biba K.J.. Integrity considerations for secure computer systems. Mitre Corporation, Bedford, MA, USA: Technical Report MTR-3153, 1977
  • 4Di Vito Ben L., Palmquist P.H., Anderson E.R., Johnston M.L.. Specification and verification of the ASOS kernel. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, 1990, 61~74
  • 5Waldhart N.A.. The army secure operating system. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, 1990, 50~60
  • 6Bell D. E. , La Padula L. J.. Secure computer systems: A mathematical model. Electronic Systems Division, Air Force System Command, Hanscom AFB, Bedford, MA: Technical Report ESD-TR-73-278, II(AD)771 543, 1973
  • 7Bell D. E. , La Padula L.J.. Secure computer system: Unified exposition and multics interpretation. MITRE Corporation,Bedford, Mass: Technical Report MTR-2997 Rev. 1, 1976
  • 8Gasser M.. Building a Secure Computer System. New York:van Nostrand Reinhold Company, 1988
  • 9Waldhart N. A.. The army secure operating system. In: Proceedings of the 1990 IEEE Symposium on Security and Privacy,Oakland, California, 1990, 10-60
  • 10Terry V. B.. Analysis of a kernel verification. In: Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, 1984, 125-133

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部