期刊文献+

基于扩展BLP模型的强制存取控制的研究与实现 被引量:2

Research and Implementation of Mandatory Access Control Based on the Extended BLP Model
下载PDF
导出
摘要 在现有的安全系统中,BLP(Bell&Lapadula)模型是最广泛使用的一种,它包括强制存取控制和自主存取控制两部分.但是BLP模型的“向下读”和“向上写”的存取规则严重影响了系统的可用性和灵活性.针对上述缺陷和实际应用需要,文中采用将主体划分为属于普通用户域和特权域主体、并为特权域主体授予特权以及修改读写规则手段对BLP模型进行扩展.经过证明,扩展后的BLP模型不仅增强了数据库系统的机密性而且增强了可用性. Among the currently existing security systems,Bell & Lapadula(BLP) is mostly used,which consists of both mandatory and discretionary access controls.However,the access rule of 'Read Down' and 'Write Up' of the BLP model seriously affects its usability and flexibility of the system.Considering the afore-mentioned defects and actual application requirements,a method to extend BLP model is introduced by dividing the subject into general domain's subject and privileged domain's subject,authorizing the subject of the privileged domain and revising the access rules.It is proved that the extended BLP model can enhance both the confidentiality and usability of the database system.
出处 《沈阳理工大学学报》 CAS 2006年第2期19-22,共4页 Journal of Shenyang Ligong University
基金 国家高技术研究发展计划(86330165B)
关键词 BLP模型 安全级别 强制存取控制 多级安全数据库 BLP model security level mandatory access control multilevel secure database
  • 相关文献

参考文献6

二级参考文献21

  • 11,Pfleeger C P. Security in Computing, Edition 2. Prentice-Hall, 1997 被引量:1
  • 22,Gallagher P R. Security of electronic information. The National Computer Security Center: Technique Report NCSC-TG-021, 1991 被引量:1
  • 33,Castano S, Fugini M, Martella G et al. Database Security. ACM Press & Addison-Wesley, 1994 被引量:1
  • 4[1]D E Bell, L J LaPadula. Secure computer system: Unifiedexposition and MULTICS interpretation. The MITRECorporation, Tech Rep: MTR-2997 Revision 1, 1976 被引量:1
  • 5[2]T Y Lin. Bell and LaPadula axioms: A "new" paradigm for an"old" model. In: Proc 1992 ACM SIGSAC New SecurityParadigms Workshop. Little Compton, Rhode Island, USA,1992. 82~93 被引量:1
  • 6[3]V D Gligor, E L Burch, C S Chandersekaran et al. On thedesign and the implementation of secure Xenix workstations.In: Proc of the 1986 IEEE Symposium on Security andPrivacy. Oakland, California: IEEE Computer Society Press,1986. 102~117 被引量:1
  • 7[4]II C W Flink, J D Weiss. System V/MLS labeling andmandatory policy alternatives. AT&T Technical Journal,1988, (5/6): 53~64 被引量:1
  • 8[5]G L Grenier, R C Holt, M Funkenhauser. Policy vsmechanism in the secure TUNIS operating system. In: 1989IEEE Symposium on Security and Privacy. Oakland,California: IEEE Computer Society Press, 1989. 84~93 被引量:1
  • 9[6]P A Karger, M E Zurko, D W Bonin et al. A VMM securitykernel for the VAX architecture. In: 1990 IEEE ComputerSociety Symposium on Research in Security and Privacy.Oakland, California: IEEE Computer Society Press, 1990. 2~19 被引量:1
  • 10[7]N A Waldhart. The army secure operating system. In: 1990IEEE Computer Society Symposium on Research in Securityand Privacy. Oakland, California: IEEE Computer SocietyPress, 1990. 50~60 被引量:1

共引文献61

同被引文献9

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部