期刊文献+

基于可信计算的多级安全模型 被引量:1

Multi-level security model based on trusted computing
下载PDF
导出
摘要 针对当前多级安全模型在访问过程中缺乏信息安全保护机制的不足,基于可信计算技术对使用控制模型进行改进,实现保密性和完整性两者兼顾的多级安全模型。改进模型将在整个访问过程中对信息的安全性进行保护,并运用完整性验证策略保护信息的完整性,同时方便安全管理员根据管理需要,对安全策略进行调整,提高了系统的灵活性。 The current multi-level security model is lack of security mechanism for information on the visit process.Based on trusted computing technology,the UCON(Usage Control) model is improved to construct a multi-level security model which considers both confidentiality and integrity.The improved model can protect the security of information throughout the whole visit process,and the integrity verify policy is used to meet the integrity of information.The improved model can also facilitate security administrators to choose proper security policy according to the application,which increase the flexibility of the system.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第27期122-125,共4页 Computer Engineering and Applications
基金 国家自然科学基金重点项目(No.60633020) 西安电子科技大学计算机网络与信息安全教育部重点实验室开放课题(No.2008CNIS-06)~~
关键词 多级安全 可信计算 使用控制 multi-level security trusted computing Usage Contro(lUCON)
  • 相关文献

参考文献11

二级参考文献32

共引文献63

同被引文献14

  • 1谢钧,许峰,黄皓.基于可信级别的多级安全策略及其状态机模型[J].软件学报,2004,15(11):1700-1708. 被引量:19
  • 2黄强,沈昌祥,陈幼雷,方艳湘.基于可信计算的保密和完整性统一安全策略[J].计算机工程与应用,2006,42(10):15-18. 被引量:26
  • 3Bell D E,LAPADULA L J.Secure computer system:mathematical foundation and model [R]. mitre corp, bedford Massachussetts: technicall report ,1973. 被引量:1
  • 4Sandhu RS.Lattice-Based access control models.IEEE Com- puter,1993,26(11):9-19. 被引量:1
  • 5Eli Winjum,Bjorn Kjetil Molmann,A multidimensional approach to multilevel security[C].Information Management and Computer Security,2008. 被引量:1
  • 6Trusted Computing Group. TCG Specification Architecture Overview v1.3[EB/OL]: https:// www.Trusted computing group.org/ specs/ ,2013. 被引量:1
  • 7Xinwen Zhang, Michael J.Covington, Songqing Chen and RaviSandbu. SecureBus:Towards Application-Transparent Trusted Computing with Mandato~ Access Control . In: ASIACC'O7[C]//Singapore:ACM Press, 2007:117-126. 被引量:1
  • 8王贵超.基于多级安全策略的RFID认证协议研究[D].延边: 延边大学.2014. 被引量:1
  • 9MC Chuang,MC Chen.An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics[J].Expert Systems with Applications.2014,4(41):1411-1418. 被引量:1
  • 10Firdhous, M.; Ghazali, O. ; Hassan, S. A trust computing mechanism for cloud computing with multilevel thresholding[C].Industrial and Information Systems (ICIIS), 2011. 被引量:1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部