期刊文献+

一个多级安全通道建立协议及安全性分析 被引量:1

Multi-level secure tunnel establishment protocol and its security analysis
下载PDF
导出
摘要 在研究等级化信息系统特点的基础之上,给出了一个等级化网络环境下安全通道建立协议LTEP,该协议通过联合机制确立了不同等级、不同敏感级的信息系统间通信关系,依据虚拟主体转换以及安全标记映射规则,实现了不同等级信息系统内通信主体的授权,克服了安全标记的异构性问题,而且协议所构建的多级安全通道能够有效地实现不同敏感级别信息传输的相互隔离。拓展了基于串空间的安全协议分析方法,从认证性、机密性、完整性等几个方面对LTEP协议进行了安全性分析。 This paper analyzes the characteristics of classified information system, and puts forward a secure tunnel establishment protocol in classified network. The protocol establishes the relation of communication among different classified or level information systems by coalition, and according to virtual subject and mapping rules of secure label, it accomplishes authorization of subject and overcomes the heterogeneous of secure label in different information systems, moreover, multi-level secure tunnel established by the protocol may insulate different level information. It extends the method of secure protocol analysis based on strand space, and analyzes security of the protocol on authentication, confidentiality, integrality and so on.
出处 《计算机工程与应用》 CSCD 2012年第20期117-122,135,共7页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)(No.2009AA01Z438) 国家973计划前期研究专项(No.2011CB311801) 河南省杰出科技创新人才计划(No.114200510001h)
关键词 等级保护 多级安全 安全通道 虚拟主体 串空间 classified security protection Multi-Level Secure(MLS) secure tunnel virtual subject strand space
  • 相关文献

参考文献10

二级参考文献46

  • 1季晓君,田畅,张毓森.安全DSR路由协议分析与设计[J].通信学报,2006,27(3):136-140. 被引量:7
  • 2司天歌,张尧学,戴一奇.局域网络中的L-BLP安全模型[J].电子学报,2007,35(5):1005-1008. 被引量:16
  • 3Bell D E,LaPadula L J.Secure computer system:Unified exposition and MULTICS interpretation .Bedford,MA:The MITRE Corporation,1976.
  • 4Goguen J,Meseguer J.Security policies and security models .Proceedings of IEEE Symposium on Security and Privacy,1982 .Los Alamitos:IEEE Computer Society Press,1982.11-20.
  • 5Denning D E.A lattice model of secure information flow[J].Communication of the ACM,1976,19(5):236-243.
  • 6Sutherland D,A model of information .Proc of the 9th National Computer Security Conference .Gaithersburg,MD:National Bureau of Standards,National Computer Security Center,1986.175-183.
  • 7Lampson,Butler W.A note on the confinement problem[J].Communications of the ACM,1973,16(10):613-615.
  • 8J Todd Wittbold,Dale M Johnson.Information flow in nondeterministic systems .In Proceedings of the 1990 IEEE Computer Society Symposium on Computer Security and Privacy .Oakland,CA:IEEE,1990.144-161.
  • 9DoD 5200.28-STD,Trusted computer system evaluation criteria[S].
  • 10Gray,James W Ⅲ.Toward a mathematical foundation for information flow security .Proceedings of the Symposium on Security and Privacy .Oakland,CA:IEEE Computer Society,1991.21-34.

共引文献38

同被引文献5

  • 1NARAYANAN A, SHMATIKOV V.De-anonymizing social networks[C].Security and Privacy,2009 30th IEEE Sympo- sium on.IEEE, 2009 : 173-187.
  • 2PALEN L,DOURISH P.Unpacking privacy for a networked world[C].Proceedings of the SIGCHI Conference on HumanFactors in Computing Systems.ACM,2003:129-136.
  • 3JECKMANS A, TANG Q, HARTEL P. Privacy- preserving profile matching using the social graph[C].Computational Aspects of Social Networks(CASoN), 2011 International Conference on.IEEE, 2011 : 42-47.
  • 4MYUNGSUN K,LEE H T, CHEON J H.Mutual private set intersection with linear complexity[C].Information Security Applications.Springer Berlin Heidelberg, 2012 : 219-231.
  • 5吴信东,李毅,李磊.在线社交网络影响力分析[J].计算机学报,2014,37(4):735-752. 被引量:120

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部