期刊文献+

一个基于网格环境的安全信息流模型

Security Information Flow Model Based on Grid Environment
下载PDF
导出
摘要 网格安全是网格中的一个重要组成部分,它直接影响着网格的发展和网格系统软件的实际应用。为了充分描述网格环境下的信息流动情况,扩展了一般网络环境下的主体、客体,利用客体的组织密级、密级、完整性等级来划分安全类,定义信息流策略,给出了一个基于网格环境的安全信息流模型。经严格的数学证明,新模型满足Denning的信息流模型的有限格和最小上界运算符性质,是合理的、安全的,它是BLP模型、Biba模型对应的信息流模型的扩展,也是一般网络环境下的安全信息流模型的扩展,这对网格安全研究有一定的积极意义。 The grid security is an important component,and it directly affects the development of the grid and the practical application of grid system software.In order to fully describe the information flow based on grid environment,a new security information flow model based on grid environment was given,in which the safety class was divided and the information flow policy was defined by using the organization security classifications,classifications,and integrity grade of the object.In this article,the subject and the object were extended,and the concepts of the decomposition of the subject and object,and of organization security classification were defined.The strict mathematics verification shows that this new information flow model satisfies the character of finite lattice and least upper bound operator of the Denning's information flow model,it is reasonable and safe.It is an extension of information flow model contrast to BLP model's and Biba model's,but also the expansion of security information flow model based on the general network environment,and there has some positive significance for the study grid security.
作者 刘益和
出处 《计算机科学》 CSCD 北大核心 2011年第6期157-160,199,共5页 Computer Science
基金 国家973项目(1999035801) 四川省应用基础研究计划课题(04JY029-096) 四川省教育厅自然科学重点项目(09ZA055)资助
关键词 网格安全 BLP模型 BIBA模型 信息流模型 Grid security BLP model Biba model Information flow model
  • 相关文献

参考文献11

  • 1Bell D E, Lapadula L J. Secure compter system:. Mathematical foundation[R]. MTR-2527. Mitrecorp, Bedford, MA, 1973.
  • 2Biba K. Integrity Considerations for Secure Computing Systems [R]. MTR-3153. Mitre Corporation, Bedford, MA, 1975.
  • 3Denning D E. A lattice model of secure information flow[J]. Communications of the ACM, 1976,19(5) :236-243.
  • 4Ravi S. Sandhu. Lattic-Based Access Control Model[J]. IEEE computer, 1993,26(11) :9-19.
  • 5刘益和,沈昌祥.一个信息安全函数及应用模型[J].计算机辅助设计与图形学学报,2005,17(12):2734-2738. 被引量:7
  • 6李焕洲,刘益和,李华.基于信任和安全等级的P2P信息流模型[J].计算机应用,2008,28(12):3168-3170. 被引量:5
  • 7Oo M P, Naing T T. Access Control System for Grid Security Infrastrueture[C] // 2007 IEEE/WIC/ACM International Con- ferences on Web Intelligence and Intelligent Agent Technology Workshops. 2007 : 299-302.
  • 8Huang Xiao-qin, et al. An Identity-Based Model for Grid Securi- ty Infrastructure[C]//ISSADS2005, LNCS3563. Berlin Heidel- berg : Springer-Verlag, 2005 : 258-266.
  • 9Bivens H. Grid work flow[R]. Albuquerque: Sandia National Laboratory, 2001.
  • 10周建涛,叶新铭.网格工作流及其关键技术研究综述[J].内蒙古大学学报(自然科学版),2008,39(5):581-589. 被引量:6

二级参考文献54

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部