期刊文献+

高安全级信息系统中的特权控制机制及其模型研究 被引量:3

Research on the privilege control mechanism and modeling of a high level information system
原文传递
导出
摘要 为满足高安全级信息系统最小特权需求,提出一种强制访问控制模型EPMM。该模型采用三权分立机制对系统中的特权管理进行改进,将原有的超级用户划分为系统管理员、安全管理员和审计管理员,将其中任一个管理员的权限控制在其职责范围内。建立了模型公理系统并对主要定理进行了证明,使非法用户或异常操作对系统所造成的损失降为最小。 In order to satisfy the least privilege requirement of a high level information system,a mandatory access control model EPMM is proposed.The privilege of system is divided into three parts: system manager,security manager and audit manager,and none of the managers can destroy the whole system.Formal description for authorization division is presented,and the main theorems of EPMM are proven,so it can reduce the system loss caused by disabled users and abnormal operations.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2011年第9期57-60,共4页 Journal of Shandong University(Natural Science)
基金 信息安全国家重点实验室开放课题项目
关键词 特权管理 形式化描述 安全模型 privilege management formal description security model
  • 相关文献

参考文献7

  • 1Charles Salemi. A privilege mechanism for UNIX system V release 4 operating systems [ C ]//Proceedings of the 1069 AFIPS Fall Joint Computer Conference. Montvale, NJ: AFIPS Press, 1969 : 119-133.
  • 2季庆光,卿斯汉,贺也平.支持POSIX权能机制的一个新的特权控制的形式模型[J].中国科学(E辑),2004,34(6):683-700. 被引量:5
  • 3CHEN S, DUNAGAN J, VERBOWSKI C, et al. A black-box tracing technique to identify causes of leastprivilege incompatibilities [ C ]//Proceedings of Network and Distributed System Security Symposium. [ S. l. ] : [ s. n. ] ,2005:34-37.
  • 4David Ferraiolo D. Richard Kuhn, Ramaswamy Chandramouli. Role-based access control [ M ]. Norwood : Artech House, 2003.
  • 5SANDHU R, COYNE E J, FEINSTEIN H L, et al. Role-based access control models [ J ]. IEEE Computer, 1996, 29 (2) :38-47.
  • 6FERRAIOLO D F, CUGINI J, KUHN D R. Role-based access control (RBAC) : features and motivations [C ]// Proccedings of the l lth Annual Computer Security Applications Conference. Washington:IEEE Computer Society, 1995 : 241-248.
  • 7杨涛,沈昌祥,陈福接.一个用于安全操作系统特权管理的改进Bell-La Padula模型[J].计算机研究与发展,1993,30(1):45-49. 被引量:7

二级参考文献24

  • 1[18]Ferraiolo D F, Barkley J F, Kuhn D R. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Infoemation and System Security, Vol.2, No. 1, February 1999. 34~64
  • 2[19]Clark D D, Wilson D R. A comparison of commercial and military security policies. In: Proceedings of 1987 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, April 1987,184~238
  • 3[20]Ferraiolo D F, Cugini J A, Kuhn D R. Role-based control(RBAC): features and motivations, In: Proceedings. 11th Annual Computer Security Applications Conference, December 1995, 241~248
  • 4[1]Curry, D. A. Improving the security of your UNIX system, Technology report ITSTD-721-FR-90-21, SRI International, April 1990
  • 5[2]IBM server group, Addressing secrity issues in Linux. A Linux White Paper, 2000
  • 6[3]Data General, Managing security on DG/UX system, manual 093-701138-4, Data General Corporation,Westboro, MA01580, Nov. 1996
  • 7[4]Cowan C, Beattie S, Kroach-Hartman G, et al. SubDomain: parsimonious server security, 14th USENIX Systems Administration Conference (LISA 2000), New Orleans, LA, December 2000, 355~367
  • 8[5]Chandramouli R. A framework for multiple authorization types in a healthcare application system. In:Proc. 17th Annual Computer Security Applications Conference, December 2001, 137~148
  • 9[6]Hoffman J. Implementing RBAC on a type enforced system. In: Proc. 13th Annual Computer Security Applications Conference, December 1997, 158~163
  • 10[7]Sandhu R S, Coyne E J, Feinstein H L, et al. Role Based Access Control Models. IEEE Computer, vol 29, Num 2, February 1996, 38~47

共引文献10

同被引文献26

  • 1刘熙.浅谈黑客攻防[J].硅谷,2009,2(1). 被引量:2
  • 2姚利君.浅议城镇“智慧安居”建设[J].中国公共安全,2013(7):90-96. 被引量:7
  • 3杨涛,沈昌祥,陈福接.一个用于安全操作系统特权管理的改进Bell-La Padula模型[J].计算机研究与发展,1993,30(1):45-49. 被引量:7
  • 4崔宾阁,刘大昕.强制访问控制在基于角色的保护系统中的实现[J].计算机工程,2006,32(6):167-169. 被引量:5
  • 5洪澄 张敏 冯登国.AB-ACCS一种云存储密文访问控制方法.计算机研究与发展,2010,47(1):259-265.
  • 6比特网.2008-2009年中国IDC业务市场研究年度报告[EB/OL].(2009-03-25)[2013-03-10].http://datacenter.chinabyte.com/203/8768703.shtml.
  • 7汪来富,沈军,金华敏.商密云存储系统应用研究[J].信息安全与通信保密,2010,26(6):67-70.
  • 8Rhoton J,Haukioja R. Cloud Computing Architecture:Solutions Design Handbook [ M ]. America : RecursivePress, 2011 :5-6.
  • 9McMillan R. Cloud Computing ‘A Security Nightmare,,Says Cisco CEO [ EB/OL ]. [ 2014 - 07 - 02 ]. http://www. networkworld. comnews/2009/042309 - cloud - com-puting-a-security-nightmare. html.
  • 10John Harauz,Lori M,Kaufman,Bruce Potter. Data Se-curity in the World of Cloud Computing [ J ]. IEEE Secur-ity & Privacy,2_,7(4) :61-64.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部