期刊文献+

通过RBAC和TE模型融合实现Clark-Wilson模型(英文)

Enforcement of Clark-Wilson model in combination of RBAC and TE models
下载PDF
导出
摘要 提出通过融合RBAC和TE模型来实现Clark-Wilson模型的一种方法,即:通过不同用户赋予不同角色实现责任分立;利用特殊的域表示变换过程;使用不同的类型标识约束数据项和非约束数据项.分析了实施和认证规则的正确性.通过在SEBSD系统中实施了FTP的完整性安全策略的实例,说明该方法能够实现细粒度的访问控制和灵活配置. An approach to enforce Clark-Wilson model in the combination of RBAC and TE models is presented,namely:separation of duties is addressed by assigning different roles to different users;special domains are used for representing transformation procedures;and the constrained data items and unconstrained data items are labeled with different types.The correctness of the enforcement and certification rules is analyzed.A detailed case study of FTP integrity policy is implemented under SEBSD,and shows that the approach achieves fine-grained access control and flexible configuration.
出处 《中国科学院研究生院学报》 CAS CSCD 北大核心 2010年第4期538-546,共9页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 Supported by National 863 Hight-tech Research Development Program of China (2006AA01Z451,2007AA010505,and 2009AA01Z432)
关键词 安全操作系统 CLARK-WILSON模型 RBAC模型 TE模型 secure operating system Clark-Wilson RBAC type enforcement
  • 相关文献

参考文献21

  • 1Clark D D,Wilson D R.A comparison of commercial and military computer security policies[C] //IEEE Symposium of Security and Privacy,1987:184-194.
  • 2SELinux[EB/OL].[2009-11-10].Http://www,nsa.Gov/research/selinux/index,shtml.
  • 3Ferraiolo D,Kuhn R.Role-based access controls[C] //Proceedings of the 15th National Computer Security Conference,October 1992.
  • 4Sandhu R,Coyne E J,Feinstein H L,et al.Role-based access control model[J].IEEE Computer,1996,29(2):38-47.
  • 5Ferraiolo D F,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and Systems Security,2001,4(3):1-51.
  • 6Boebert W,Kain R.A practical alternative to hierarchical integrity policies[C] //Proceedings of the Eighth National Computer Security Conference,1985.
  • 7Brien R O,Rogers C.Developing applications on LOCK[C] //Proc.14th National Computer Security Conference,Washington DC,1991:147-156.
  • 8Badger L,Sterne D F,Sherman D L,et al.A domain and type enforcement UNIX prototype[J].Usenix Computing Systems,1996,9(1):47-83.
  • 9Tidswell J,Potter J.An approach to dynamic domain and type enforcement,Microsoft Research Institute,Department of Computing,Macquarie University,NSW,Australia,2000.
  • 10Hallyn S E,Kearns P.Domain and type enforcement for Linux[EB/OL].[2009-11-04].http://www·CS·wm·edu/-kearns/001lab.d/pmjects.d/sis2000.pdf.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部