期刊文献+

Biba改进模型在安全操作系统中的应用 被引量:1

Application of Improved Biba Model in Security Operating System
下载PDF
导出
摘要 经典Biba模型的严格完整性策略在应用中未考虑主客体操作的复杂性,且信息向操作系统安全子系统(SSOOS)范围外传输时存在完整性问题。针对上述问题,根据GB/T 20272-2006中结构化保护级标准对安全操作系统完整性的要求,在主客体完整性的灵活性、操作复杂性、SSOOS之外完整性标签等方面对Biba模型进行改进。理论分析结果证明,该模型在确保经典Biba模型完整性的基础上,大幅提升了系统的可用性。 The strict integrity strategy of classical Biba model does not consider the problem of complexity in application of host-guest and the problem of the integrity of the label when the information transmits to outside of Security Subsystem of Operating System(SSOOS). According to GB/T 20272-2006 specification for safety operating system, this paper improves classical Biba model in the flexibility in integrity of host-guest, operation complexity and the integrity of the label beside SSOOS. Theory analysis result shows that improved Biba model enhances system usability on basis of guaranteeing integrity of Biba model.
出处 《计算机工程》 CAS CSCD 2012年第13期96-98,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61072017) "核高基"重大专项(2010ZX01036-001-001)
关键词 BIBA模型 安全操作系统 完整性模型 结构化保护级 完整性策略 Biba model security operating system integrity model structural protection level integrity policy
  • 相关文献

参考文献8

  • 1Bishop M.Computer Security:Art and Science[M].Boston,USA:Addison Wesley,2003:3-6.
  • 2Clark D D,Wilson D R.A Comparison of Commercial andMilitary Computer Security Policies[C]//Proc.of IEEE SymposiumSecurity and Privacy.Oakland,USA:IEEE Press,1987.
  • 3Biba K J.Integrity Considerations for Secure ComputerSystems[R].US Air Force Electronic System Division,Tech.Rep.:ESD-TR-76-372,1977.
  • 4Goguen J A,Meseguer J.Security Policies and SecurityModels[C]//Proc.of Symposium on Security and Privacy.Oakland,USA:[s.n.],1982:11-20.
  • 5Badger L,Sterne D F,Sherman D L,et al.A Domain and TypeEnforcement UNIX Prototype[J].USENIX Computing Systems,1996,9(1):47-83.
  • 6Sutherland D.A Model of Information[C]//Proc.of the 9thNational Security Conference.Gaithersburg,USA:[s.n.],1986.
  • 7张相锋,孙玉芳.Biba模型中严格完整性政策的动态实施[J].计算机研究与发展,2005,42(5):746-754. 被引量:15
  • 8卢小亮.基于角色的蓝牙访问控制系统设计与实现[D].郑州:解放军信息工程大学,2009.

二级参考文献23

  • 1K.J. Biba. Integrity considerations for secure computer systems.USAF Electronic System Division, Hanscom Air Force Base,Tech. Rep.: ESD-TR-76-372, 1977.
  • 2J.A. Goguen, J. Meseguer. Security policies and security models. The 1982 Symposium on Security and Privacy, Oakland,CA, 1982.
  • 3T. Mayfield. Integrity in automated information system. National Computer Security Center, Technical Report, 1991. 79~ 91.http://www.radium.ncsc.mil/tpep/library/rainbow/C-TR-79-91.ps.
  • 4Joint Technical Committee 1. ISO/IEC 15408-2, 1999.
  • 5P.A. Loscocco, S. D. Smalley, P. A. Muckelbauer, etal. The inevitability of failure: The flawed assumption of security in modern computing environments. In: Proc. the 21st National Information Systems Security Conf. Crytal: National Computer Security Center, 1998. 303~314.
  • 6D. Sutherland. A model of information. The 9th National Security Conf., Gaithersburg, 1986.
  • 7D.D. Clark, D. R. Wilson. A comparison of commercial and military computer security policies. The 1987 IEEE Symposium on Security and Privacy, Oakland, California, 1987.
  • 8D. Brewer, M. Nash. The Chinese wall security policy. In:Proc. of IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1989. 206~214.
  • 9L. Badger, D. F. Sterne, D. L. Sherman, et al. A domain and type enforcement UNIX prototype. USENIX Computing Systems, 1996, 9(1): 47~83.
  • 10P. Loscocco, S. Smalley. Integrating flexible support for security policies into the Linux operating system. FREENIX Track: 2001 USENIX Annual Technical Conf. ( FREENIX' 01 ), Berkeley,CA, 2001.

共引文献14

同被引文献15

  • 1GB/T20272—2006,信息安全技术,操作系统安全技术要求[S].2006.
  • 2BISHOP M.Computer security:art and science[M].Boston:Addison Wesley,2003:3-6.
  • 3BIBA K J.Integrity considerations for secure computer systems[R].Washington:US Air Force Electronic System Division,1977.
  • 4CLARK D D,WILSON D R.A comparison of commercial and military computer security policies[C]//Proceedings of IEEE Symposium Security and Privacy.Oakland:IEEE,1987:184-195.
  • 5BADGER L,STERNE D F,SHERMAN D L,et al.A domain and type enforcement UNIX prototype[C]//Proceedings of the Fifth USENIX UNIX Security Symposium.Utah:USENIX,1996:127-140.
  • 6SUTHERLAND D.A model of information[C]//Proceedings of the 9th National Computer Security Conference.Gaithersburg:U.S.Government Printing Office,1986:126-132.
  • 7ZHANG Ming-xi,WEI Jun-yin,CHENG Yu-qiang,et al.Strict integrity policy of Biba model with historical characteristics[J].J Zhenzhou Univ:Nat Sci Ed,2011,43(1):85-89.
  • 8GB/T 20272-2006 Information Security Technology-Security Techniques Requirement for Operating System[S].Beijing:China National Standardization Management Committee,2006.
  • 9SLAM[EB/OL].(2012-07-14)[2012-08-12].http://research.microsoft.com/en-us/projects/slam/.
  • 10KEVIN E,GERWIN K,RAFAL K.Formalising a high-performance microkernel[C]//Proceedings of Workshop on Verified Software:Theories,Tools,and Experiments.Seattle:Springer,2006:1-7.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部