期刊文献+

基于XML的数据客体与安全标记绑定方法 被引量:3

Method of Binding Secure Label to Data Object Based on XML
下载PDF
导出
摘要 安全标记与数据客体的绑定,是制约多级安全真正走向网络实用化的关键问题。针对这一问题,在深入分析XML的基础上,描述了XML客体安全标记及其约束规则,提出了安全标记与数据客体的绑定方法,讨论了安全标记查询、客体内容裂解等相关操作,给出了基于XML安全标记的安全通信实施机制。该绑定方法不仅能够满足多级信息系统间安全通信的需要,而且能够实施粒度更细的访问控制,提高信息客体的利用率。 How to bind secure label to data object is a key problem in multi-level network that restricts MI~ from prac- ticality on network. This paper analyzed deeply xml,and expounded secure label of object based on xml and its restric- tions,then put forward a method of binding secure label to data object based on XML. At the same time, some opera- tions were discussed in detail, such as query of secure label, decomposition of object. Finally, secure communication based on secure label was described in multi-level network. The method can not only meet the need of secure communi- ~ation in multi-level network, but also accomplish fine-grained mandatory access control, which may improve availability of information and reduce complexity of binding.
出处 《计算机科学》 CSCD 北大核心 2013年第8期124-128,145,共6页 Computer Science
基金 国家863高技术研究发展计划项目(2009AA01Z438) 国家973计划前期研究专项(2011CB311801) 河南省杰出科技创新人才计划(114200510001h)资助
关键词 多级安全 等级保护 XML 安全标记 数据客体 MLS Classified security protection XML Secure label Data object
  • 相关文献

参考文献11

  • 1中华人民共和国国家质量监督检验检疫总局.GB/T22239-2008信息安全技术信息系统安全等级保护基本要求[S].2008.
  • 2Bell P D E, Padula L J L. Secure computer system: unified expo- sition and multics interpretation [R]. ESD-TR-75-306. MTR 2997 Rev. 1 ,The MITRE Corporation, 1976.
  • 3季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 4何建波,卿斯汉,王超.对两个改进的BLP模型的分析[J].软件学报,2007,18(6):1501-1509. 被引量:22
  • 5Peng P C, Rohatgi P, Keser C. Fuzzy multi-level security: an ex- periment on quantified risk-adaptive access control[C]//IEEE Symposium on Security and Privacy. Oakland, CA, May 2007: 222-230.
  • 6Magnani M, Montesi D. A Unified Approach to Structured, Se- mistructured and Unstructured Data[R]. UBLC 2004-9. Uni- versity of Bologna, 2004.
  • 7Lee T Y. Formalisms on Semi-structured and Unstructured Data Schema Computations [D]. University of Hong Kong, Hong Kong Special Administrative Region, 2010.
  • 8李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 9Oudkerk S. A Proposal for an XML Confidentiality Label and Related Binding of Metadata to Data Objeets[R]. RTO-MP- IST-091 -22. NATO C3 Agency. 2010.
  • 10Blazic A J, Saljic S. Confidentiality Labeling Using Structured Data Types[C]//2010 Fourth International Conferences on Di- gital Society. ST,Maarten,Feb. 2010:.182-187.

二级参考文献25

  • 1季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 2Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
  • 3Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
  • 4Mayer FL. An interpretation of refined Bell-LaPadula model for the TMach kernel. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 368-378.
  • 5Lunt T, Denning D, Schell R, Heckman M, Shockley W. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593-607.
  • 6Bell DE, La Padula LJ. Secure computer system: Unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1,1976.
  • 7Schell RR, Tao TF, Heckman M. Designing the GEMSOS security kernel for security and performance. In: Proc. of the 8th National Computer Security Conf. 1985. 108-119.
  • 8Lee TMP. Using mandatory integrity to enforce commercial security. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 140-146.
  • 9Clark DD, Wilson DR. A comparison of commercial and military security policies. In: Proc. of the 1987 IEEE Syrup. on Research in Security and Privacy. IEEE Computer Society Press, 1987. 184-238.
  • 10Rushbyc J. Design and verification of secure systems. ACM Operating Sysstem Review, 1981,15(5):12-21.

共引文献125

同被引文献23

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部