期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Biba改进模型在安全操作系统中的应用 被引量:1
1
作者 郭荣春 刘文清 +1 位作者 徐宁 李继云 《计算机工程》 CAS CSCD 2012年第13期96-98,共3页
经典Biba模型的严格完整性策略在应用中未考虑主客体操作的复杂性,且信息向操作系统安全子系统(SSOOS)范围外传输时存在完整性问题。针对上述问题,根据GB/T 20272-2006中结构化保护级标准对安全操作系统完整性的要求,在主客体完整性的... 经典Biba模型的严格完整性策略在应用中未考虑主客体操作的复杂性,且信息向操作系统安全子系统(SSOOS)范围外传输时存在完整性问题。针对上述问题,根据GB/T 20272-2006中结构化保护级标准对安全操作系统完整性的要求,在主客体完整性的灵活性、操作复杂性、SSOOS之外完整性标签等方面对Biba模型进行改进。理论分析结果证明,该模型在确保经典Biba模型完整性的基础上,大幅提升了系统的可用性。 展开更多
关键词 BIBA模型 安全操作系统 完整性模型 结构化保护级 完整性策略
下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
2
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部