期刊文献+

信息系统安全模型的分析与设计 被引量:1

Analysis and Design of Security Model for Information System
下载PDF
导出
摘要 信息系统安全模型的构建是获得信息系统安全的基础和保障。阐述了信息系统及其安全性问题,提出了一种集用户界面逻辑、业务逻辑和异常探测机于一体的信息系统安全模型,并对其主要组成部分的工作流程和功能实现进行了详细说明。 Information system security model construction is the foundation and guarantee of information system security.This paper expounded information system and its safety problems,put forward a kind of information system security model integrating user interface logic and business logic and anomaly detection machine,it introduced simultaneously the main part of the work processes and functions.
作者 付沙
出处 《计算机安全》 2010年第10期51-53,共3页 Network & Computer Security
关键词 信息系统 模型 业务逻辑 异常探测机 information system security model business logic anomaly detection machine
  • 相关文献

参考文献5

二级参考文献33

  • 1闵京华,马卫国,胡道元.基于信息安全理论和模型的安全需求分析[J].网络安全技术与应用,2004(11):58-60. 被引量:8
  • 2Ferraiolo D, Barkley F, Kuhn DR. A Role Based Access Control Model and Reference Implementation within a Corporate Intranet[ J]. ACM Transactions on Information Systems Security, 1999, 1(2).
  • 3Sandhu B, Ferraiolo D, Kuhn B. The NIST Model for Bole - Based Access Conrol: Towards A Unified Standard [ A]. Proceedings of 5th ACM Workshop on Bole - Based Access Control [ C]. ACM,Berlin, Germany, July 26 -28 2000.
  • 4David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role based access control model and reference implementation within a corporate intranet[ J] .ACM Ttansactions on lnformtion Systems Security, February 1999,2(1) :34- 64.
  • 5John McLean. Security Models and Information Flow[ A ]. Proceedings of the IEEE Symposium on Security and Privacy[C]. Oakland, California, IEEE Computer Society Press, 1990.180 - 187.
  • 6John McLean. Security Models, Encyclopedia of Software Engineering[M]. Marciniak J (ed.).Wiley & Sons, 1994.
  • 7John McLean. A comment on the "basic security theorem" of bell and LaPadula[ J]. Information Processing Lettes, 1985,20(2) :67 - 70.
  • 8D E Bell, L J La Padula. Secure Computer System: Unified Exposition and Multics Interpretation [ R ]. The MITRE Corporation, Massachusetts, USA, ESD-TR-75 - 306,1976.
  • 9Andrew C. Myers Barbara Liskov. A Decentralized Model for Information Flow Control[A] Proceedings of the 16th ACM Symposium on Operating Systems Principles[ C ]. Saint-Malo, France: October 1997. 129- 142.
  • 10Ravi S. Sandhu. Lattice-based access control models[J]. IEEE Computer, November 1993,26( 11 ) : 9 - 19.

共引文献50

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部