期刊文献+

多安全政策支持框架研究

Research on Framework for Multi-policy
下载PDF
导出
摘要 如何在安全信息系统中支持多种安全政策是近年研究的热点,该文将多安全政策支持框架分为3个大类:基于统一安全模型的FMP,基于安全属性的FMP和基于政策描述语言的FMP。对典型例子进行了分析和比较,结合真实安全环境的特征提出了今后的研究方向,列举了一种FMP在安全操作系统中实施的实例。 How to support multi-policy in secure information systems is a research hotspot in recent years. In the paper, FMP(Framework for multi-policy) studies are divided systematically in three classes: FMP based on policy language, FMP based on security attributes and FMP based on uniformed security model. Accordingly, typical FMPs of each class are analyzed and compared, and a research direction is pointed out. A practical case of enforcing FMP in secure OS is described.
作者 单智勇
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期148-150,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60073022) 国家"863"计划基金资助项目(863-306-ZD12-14-2) 中国科学院知识创新工程基金资助项目(KGCX1-09) 中科院软件所培育基金资助项目(CXKE5143)
关键词 访问控制 多安全政策支持框架 安全操作系统 Access control Framework for multi-policy(FMP) Secure OS
  • 相关文献

参考文献11

  • 1Abrams M,LaPadula L,Eggers K,et al.A Generalized Framework for Access Control:An Informal Description[C]//Proceedings of the 13th National Computer Security Conference.1990:134-143. 被引量:1
  • 2Secure Computing Corporation.DTOS Lessons Learned Report[R].Secure Computing Corporation,Secure Computing Corporation,Technical Report:DTOS CDRL A008,1997. 被引量:1
  • 3Spencer R,Smalley S,Loscocco P,et al.The Flask Security Architecture:System Support for Diverse Security Policies[R].Univ.of Utah.,Technical Report:UUCS-98-014,1998-08. 被引量:1
  • 4Minsky N H,Ungureanu V.Unified Support for Heterogeneous Security Policies in Distributed Systems[C]//Proc.of the 7th USENIX Security Symposium.1998-01. 被引量:1
  • 5Jajodia S,Samarati P,Subrahmanian V,et al.A Unified Framework for Enforcing Multiple Access Control Policies[C]//Proc.of SIGMOD'97.1997:474-485. 被引量:1
  • 6Loscocco P,Smalley S.Integrating Flexible Support for Security Policies into the Linux Operating System[R].NSA and NAI Labs,2001. 被引量:1
  • 7Galiasso P,Bremer O,Hale J,et al.Policy Mediation for Multi-enterprise Environments[C]//Proc.of ACSAC.2000:100-106. 被引量:1
  • 8Osborn S,Sandhu R,Munawer Q.Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J].ACM Transactions on Information and System Security,2000,3(2):85-106. 被引量:1
  • 9单智勇,孙玉芳.环境适应的通用多安全政策支持框架研究[J].计算机研究与发展,2003,40(2):235-244. 被引量:1
  • 10单智勇,孙玉芳.带二级缓冲机制的通用访问控制框架研究及实现[J].计算机学报,2004,27(11):1576-1584. 被引量:3

二级参考文献53

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2D F Ferraiolo, R Kuhn. Role-based access control. The 15th National Computer Security Conf, Baltimore, MD, 1992. http://hissa.ncsl.nist.gov/kuhn 被引量:1
  • 3R S Sandhu et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47 被引量:1
  • 4P Loscocco et al.The Inevitability of failure: The flawed assumption of security in modern computing environments, national security agency. The 21st National Information Systems Security Conf, Virginia, USA, 1997 被引量:1
  • 5David F Ferraiolo. An argument for the role-based access control model. The 6th ACM Symp on Access Control Models and Technologies, Chantilly, Virginia, USA, 2001 被引量:1
  • 6R Sandhu, P Samarati. Access control: Principles and practice. IEEE Communications, 1994, 32(9): 40~48 被引量:1
  • 7Feustel, Mayfield. The DGSA: Unmet information security challenges for operating system designers. Operating Systems Review, 1998, 32(1): 3~22 被引量:1
  • 8Research Challenges in Operating System Security, Arlington, Hilton: DARPA/ISO. 1997. http://www.ito.arpa.mil/Proceedings/OS_Security/challenges/challenges_long.html 被引量:1
  • 9J H Saltzer, M Schroeder. The protection and control of information sharing in multics. Communications of the ACM, 1974, 17(7): 388~402 被引量:1
  • 10J Hoffman. Implementing RBAC on type enforced systems. In: Proc of the 13th Annual Computer Security Applications Conf. San Diego, CA: IEEE Computer Society Press, 1997 被引量:1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部