期刊文献+

基于虚拟安全域的多级安全访问控制

Multi-level Security Access Control Based on Virtual Security Domain
下载PDF
导出
摘要 虚拟化技术作为云计算的核心技术,相对于传统技术具有节约开销、易于管理、灵活制定等优势,成为业界应用的热点技术。文章研究了传统的BLP多级安全模型,并改进了该模型应用于虚拟化系统访问控制,结合虚拟安全域的概念,设计实现了虚拟化系统访问控制模型,主要结合分级分域原则对虚拟机之间的通信控制和虚拟机对虚拟磁盘的访问控制进行约束。 Virtualization technology as the core technology of the cloud computing technology,compared to traditional technology with cost saving,easy management,flexible development and other advantages,becomes the hot technology in the industry application.In this paper,the traditional BLP multilevel security mode wsa studied,and the application of the model to the virtualized system access control was improved,combined with the concept of virtual security domain,the virtual control system was designed and implemented,and the communication control between the virtual machines and the access control of the virtual machine to the virtual disk were mainly combined with the hierarchical classification principle.
作者 孙阳 刘京 郎静宏 柯文浚 SUN Yang;LIU Jing;LANG Jinghong;KE Wenjun(Naval Aviation University,Yantai Shandong 264001,China;China Aerospace Academy of Systems Science and Engineering,China;China Aerospace of Space Technology,Beijing 100048,China)
出处 《海军航空工程学院学报》 2018年第6期523-530,共8页 Journal of Naval Aeronautical and Astronautical University
基金 国家自然科学基金资助项目(51505493) 航空科学基金资助项目(2016ZA01008)
关键词 云计算 BLP多级安全模型 虚拟安全域 分级分域 访问控制 cloud computing BLP multi-level security model virtual security domain hierarchical domain partition access control
  • 相关文献

参考文献4

二级参考文献48

  • 1姚键,茅兵,谢立.一种基于有向图模型的安全策略冲突检测方法[J].计算机研究与发展,2005,42(7):1108-1114. 被引量:29
  • 2王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 3张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1404

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部