期刊文献+

改进的多级安全模型的设计与实现 被引量:2

Design and implementation of improved multiple-level security model
下载PDF
导出
摘要 在分析BLP模型和RBAC模型及其相关衍生模型的基础上,提出一种改进的模型。改进模型主要有4个重要特点:(1)实施完整性控制,保证信息流上写安全性;(2)限定可信主体,赋予其余主体有限特权;(3)实施RBAC模型,分配角色和权限;(4)引入审计机制,提供策略监控。实验结果表明,改进后的模型在完善安全性的同时提高了实用性。 On the basis of the BLP model and RBAC model,a new improved multiple-level model is presented.The improved model has four important features:(1)carry out the control of integrity;(2)constrain the trusted subject and limit the right of other subjects;(3)realize RBAC model to assign the role and the permission;(4)fulfill the audit mechanism rules to monitor the security policy.Experimental results show that the improved model increases security and the usability.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第4期77-80,共4页 Computer Engineering and Applications
基金 国家支撑计划(No.2008BAH21B03) 浙江省科技计划(No.2007C11088) 浙江省重大专项(No.2007C11068)
关键词 完整性控制 可信主体 基于角色的访问控制(RBAC)模型 审计机制 control of integrity trusted subject Role-Based Access Contro(lRBAC)model audit mechanism
  • 相关文献

参考文献10

  • 1Bell D E,Leonard J L.Secure computer system:Unified exposition and MULTICS interpretation, MTR-2997[R].Bedford, MA, USA: The Mitre Corporation, 1976.
  • 2Sandhu R S, Coyne E J, Feinstein H L.Role-based access control models [J].IEEE Computer, 1996,29 ( 2 ) : 38-47.
  • 3Lee E S.Essays about computer security[M].Centre for Communications Systems Research, Cambridge, 1999:153-163.
  • 4刘威鹏,张兴.基于非传递无干扰理论的二元多级安全模型研究[J].通信学报,2009,30(2):52-58. 被引量:11
  • 5雷新锋,刘军.基于RBAC扩展模型的BLP及Biba模型实现[C]//中国计算机学会信息保密专业委员会论文集,绵阳,2005.
  • 6夏磊,黄皓,于淑英.混合多策略视图安全模型[J].计算机科学,2008,35(5):42-46. 被引量:4
  • 7Hu Hao, Feng Dengguo.BIFI: Architectural support for information flow integrity measurement[C]//Proeeedings of the 2008 International Conference on Computer Science and Software Engi- neering.Massachusetts Ave, NW Washington, DC USA: IEEE Computer Society, 2008: 605-609.
  • 8肖军模.对军用安全模型的扩展[J].电子科技大学学报,2005,34(2):186-189. 被引量:4
  • 9Sandhu R S.Lattice-based access control models[J].IEEE Computer, 1993,26(11):9-19.
  • 10谭智勇,刘铎,司天歌,戴一奇.一种具有可信度特征的多级安全模型[J].电子学报,2008,36(8):1637-1641. 被引量:13

二级参考文献39

  • 1蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 2季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 3谢钧,许峰,黄皓.基于可信级别的多级安全策略及其状态机模型[J].软件学报,2004,15(11):1700-1708. 被引量:19
  • 4BELL D E, LAPADULA L J. Secure Computer System: Unified Exposition and MULTICS Interpretation[R]. MTR-2997 Rev 1, the MITRE Corporation, Bedford,MA, USA, 1976.
  • 5BIBA K J. Integrity Considerations for Secure Computer Systems. Technical Report[R]. MTR 3153, the Mitre Corporation, 1977.
  • 6REINHOLD V N. Morrie Gasser Building a Secure Computer System[M]. 1988.
  • 7SANDHU R S. Lattice-based access control models[J]. IEEE Computer, 1993, 26(11):9-19.
  • 8LI Y E SHEN C X. A new security model of operating system[J]. Science in China(Series E), 2006, 36(4): 347-356.
  • 9RUSHBY J. Noninterference, Transitivity, and Channel-Control Security Poficies[R]. Stanford Research Institute, Tech Rep: CSL-92-02, 1992.
  • 10HAIGH J T, YONG W D. Extending the noninterference model of MLS for SAT[A]. Proceedings of the Symposium on Security and Privacy[C]. Oakland, CA, 1986.232-239.

共引文献27

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部