期刊文献+

一种BLP模型的量化分析方法 被引量:5

Quantitative Analysis Method to BLP Model
在线阅读 下载PDF
导出
摘要 BLP模型是最为经典的强制访问控制模型,它基于一个信息流策略,通过允许低安全级别到高安全级别的单向信息流动,来实现多级的强制访问控制.但对实际中普遍存在的高安全级别到低安全级别的下向信息流动,BLP模型并没有给出理论解决方法.本文对BLP模型提出一种量化的分析方法以分析下向信息流动的安全性.这一方法基于Shannon信息论中条件熵的概念,提出用安全门限来度量信息安全的方法.特别地,这一分析方法给出了下向信息流安全的条件,并证明了该条件下系统仍保持其保密性. BLP model is the most classical model in mandatory access control, it is based on a multi-level information flow policy to implement access control. However, the information flow policy of BLP model does not support downward information flow from high security level to low security level. This paper proposed an analysis method based on the conditional entropy which gives quantitative analysis to the security of BLP model. With this analysis method, we can define the confidentiality of an information system with secure thresholds defined by confidential information and its conditional entropy. We proved that under certain condition, a downward information flow won't let the system be not secure.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第8期1605-1610,共6页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划基金项目(2006AA01Z440)资助 国家"九七三"重点基础研究发展规划基金项目(2007CB311100 2007CB307101)资助 北京市科技计划项目(Z07000100720706)资助
关键词 BLP模型 下向信息流 条件信息熵 安全门限 BLP model downward information flows conditional entropy secure thresholds
  • 相关文献

参考文献2

二级参考文献13

  • 1季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 2[1]D E Bell, L J LaPadula. Secure computer system: Unifiedexposition and MULTICS interpretation. The MITRECorporation, Tech Rep: MTR-2997 Revision 1, 1976
  • 3[2]T Y Lin. Bell and LaPadula axioms: A "new" paradigm for an"old" model. In: Proc 1992 ACM SIGSAC New SecurityParadigms Workshop. Little Compton, Rhode Island, USA,1992. 82~93
  • 4[3]V D Gligor, E L Burch, C S Chandersekaran et al. On thedesign and the implementation of secure Xenix workstations.In: Proc of the 1986 IEEE Symposium on Security andPrivacy. Oakland, California: IEEE Computer Society Press,1986. 102~117
  • 5[4]II C W Flink, J D Weiss. System V/MLS labeling andmandatory policy alternatives. AT&T Technical Journal,1988, (5/6): 53~64
  • 6[5]G L Grenier, R C Holt, M Funkenhauser. Policy vsmechanism in the secure TUNIS operating system. In: 1989IEEE Symposium on Security and Privacy. Oakland,California: IEEE Computer Society Press, 1989. 84~93
  • 7[6]P A Karger, M E Zurko, D W Bonin et al. A VMM securitykernel for the VAX architecture. In: 1990 IEEE ComputerSociety Symposium on Research in Security and Privacy.Oakland, California: IEEE Computer Society Press, 1990. 2~19
  • 8[7]N A Waldhart. The army secure operating system. In: 1990IEEE Computer Society Symposium on Research in Securityand Privacy. Oakland, California: IEEE Computer SocietyPress, 1990. 50~60
  • 9[8]DoD 5200.28-STD, Department of Defense Trusted ComputerSystem Evaluation Criteria. Department of Defense.Washington, DC, 1985
  • 10[9]DTOS generalized security policy specification. SecureComputing Corporation. Tech Rep: DTOS CDRL A019, 1997

共引文献44

同被引文献36

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部