期刊文献+

基于角色的多级安全政策 被引量:1

Role based multi-level security polices
下载PDF
导出
摘要 提出一种基于角色的多级安全政策(RBMLS),将基于角色的访问控制模型(RBAC)与多级安全政策(MLS)结合起来,实现在自主中渗透着强制,在强制中蕴涵着自主的访问控制。该RBMLS将Bell-LaPadula模型中的非等级分类级别K替换为局部角色LR,并引入来源分类O,既可以实现等级分类级别不同的主客体信息之间的互动,又可实现原有数据和外来数据的有效分离,极大程度保证了数据的完整性。 A role based multi-level security policy(RBMLS) is presented,which combines Role Based Access Control(RBAC) and Multi-level Security(MLS) to realize access control in the mandatory and discretionary mode.RBMLS replaces the Unclassification(K) in Bell-LaPadula model by Local Role(LR) and introduces the Origin classification(O).The new policy could rea-lize information's bidirectional flow between the different class subjects and objects.Through the Origin classification(O),the separation between original data and foreign data can be realized,which guarantees the integrity of data.
作者 李双 袁丁
出处 《计算机工程与设计》 CSCD 北大核心 2012年第6期2166-2171,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(10990011 60763009) 北京市属高等学校人才强教计划PHR基金项目(201102)
关键词 访问控制 角色 多级安全政策 机密性 完整性 access control role multi-level security confidentiality integrity
  • 相关文献

参考文献12

  • 1石文昌,孙玉芳.多级安全性政策的历史敏感性[J].软件学报,2003,14(1):91-96. 被引量:19
  • 2梁洪亮,孙玉芳,赵庆松,张相锋,孙波.一个安全标记公共框架的设计与实现[J].软件学报,2003,14(3):547-552. 被引量:16
  • 3Elliott Bell D, La Padula L J. Secure computer system: unified exposition and multies interpretation [R]. USA: Electronic Systems Division, 1976.
  • 4Ferraiolo D F, Kuhn D R Role-based access control [C]. 13altirnore: Proceedilags of 15th National Computer Security Corrference, 1992.
  • 5Jansen W A. A revised model for role-based access control [R]. USA: Gaithersburg, MD: U. S. Department of Commerce Technology Administration National Institute of Standards and Technology, 1998.
  • 6Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control [J]. ACM Transactions on Information and System Security, 2001, 4 (3): 224-274.
  • 7I.OU J, Myong Kang. Infrastructure for multi-level secure service-oriented architecture (MLS-SOA) [C]. San Jose, CA: Military Communications Conference, 2010.
  • 8A1-Nedhami I M, Sinha P K. A privacy framework for composite web services [C]. Bangalore, India.. The Second International Workshop on Service Oriented and Optimization, 2008.
  • 9高东群,黄勤,刘益良.工作流系统中基于角色层次的任务转授权模型[J].计算机工程与设计,2011,32(6):1926-1929. 被引量:1
  • 10Rattikorn Hewett, Phongphun Kijsanayothin. Privacy and re covery in composite web service transactions [J]. International Journal for Infonomics (Ⅲ), 2010, 3 (2): 240-248.

二级参考文献11

共引文献30

同被引文献4

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部