期刊文献+

MILS CORBA中的多级安全访问控制 被引量:1

Multi-security Level Access Control of MILS CORBA
原文传递
导出
摘要 在系统地介绍了中间件层采用实时CORBA的MILS三层软件结构的基础上,根据MILS多级安全与CORBA对象请求代理相结合的特殊性,指出系统存在的常见安全威胁与迫切的安全需求。同时针对上述问题,分析了中间件CORBA与安全服务有关的重要组件,并给出在CORBA内部应用拦截器和安全服务实现访问控制机制的基本原理与流程,其中访问控制规则采用改进的BLP算法,最后对安全性改善做了详细说明。 On the basis of giving a systematic introduction about the three-layer software structure of MILS with the middleware real-time CORBA, according to the particularity of the combination of the multi-level security in MILS and the object request broker in CORBA, the common security threats existing in system and urgent security needs were pointed out. In response to these issues, the important components of the middleware CORBA about security service was put into analysis, at the same time the basic principle of the access control through the interceptors and security service within CORBA was put forward, especially a detail introduction on the process of the mechanism, where applying improved BLP model. At last, a detail description of the improvement in performance of the system security was given.
出处 《互联网天地》 2013年第1期50-54,共5页 China Internet
基金 航空科学基金资助项目(No.2010ZC31002 No.2010ZC31001.No.20101981015)
关键词 MILS CORBA 多级安全 访问控制 BLP MILS, CORBA, multi-security level, access control ,BLP
  • 相关文献

参考文献10

  • 1Jim Alves-Foss,Carol Taylor,Paul Oman. A multi-layered approach to security in high assurance systems[A].BigIsland,Hawail,2004.
  • 2Robinson R,Li M,Lintelman S. Electronic distribution of airplane software and the impact of information security on airplane safety[A].Nuremberg,Germany,2007.
  • 3Bob Blakely.CORBA安全性指南——面向对象系统的安全性[M]北京:人民邮电出版社,2000.
  • 4朱其亮;郑斌.CORBA原理及应用[M]北京:北京邮电大学出版社,2001.
  • 5OMG. Security Service Specification V1.8[M].2002.
  • 6胡林平.MILS机载安全操作系统设计[J].航空计算技术,2012,42(2):110-112. 被引量:3
  • 7OMG. Common Object Request Broker Architecture (CORBA)V3.1[M].2008.
  • 8Jeffrey Choi Robinson,W Scott Harrison,Nadine Hanebutte. Implementing middleware for content filtering and information flow control[A].2007.
  • 9崔西宁,沈玉龙,马建峰,谢克嘉.综合化航空电子系统中基于可信计算的访问控制模型[J].通信学报,2009,30(S2):86-90. 被引量:2
  • 10Carolyn Boettcher,Raytheon,E1 Segundo CA Rance DeLong. The MILS component integration approach to secure information sharing[A].St.Paul MN,2008.

二级参考文献16

  • 1ASAAC Phase II Guidelines for System Issues Volume6:Security Aspects. . 2002
  • 2Embedded systems and trusted computing security. http://www.trustedcomputinggroup.org . 2005
  • 3MCINTIRE G.Shared resource management for integrated avionics systems. DASC’94 . 1994
  • 4Bell DE,LaPadula LJ.Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244 . 1973
  • 5K. J. Biba.Integrity Considerations for Secure Computer Systems. ESD-TR-76-372, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base . 1977
  • 6Rushby J.Partitioning in avionics architectures:requirements,mechanisms,and assurance. NASA Contractor Report Nasa CR . 1999
  • 7TCG.TCG Specification Architecture Overview SpecificationRevision 1.3. http://www.trustedcomputinggroup.org . 2007
  • 8Watkins C B.Integrated modular avionics:managing the allocation of shared intersystem resources. Digital Avionics Systems Conference,DASC’06 . 2006
  • 9Sagaspe L,Bieber P.Constraint-based design and alloca-tion of shared avionics resources. Digital Avionics Systems Conference,DASC’07 . 2007
  • 10Jeffrey Choi Robinson,Jim Alves-Foss. A High Assurance MLS File Server[A].2007.45-53.

共引文献3

同被引文献4

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部