期刊文献+

用于公文流转的强制访问控制模型

The Mandatory Access Control Model for Document Flow
在线阅读 下载PDF
导出
摘要 传统的自主访问控制不能提供足够的安全,而已有的强制访问控制模型规则过于严格,导致在公文流转时应用困难.提出一种适用于公文流转的强制访问控制模型,可满足机密性和完整性要求;融合自主访问控制的灵活性和强制访问控制的安全性;实现受控信息的双向流动.使用不干扰理论证明了模型的安全性. Traditional discretionary access control can't provide adequate security. Rules of existing mandatory access control models are very rigid, and barriers in document flow occur. We propose a mandatory access control model is proposed which is suitable for document flow. In this model the requirements of both integrity and confidentiality are met. Flexibility of discretionary access control integrates with security of mandatory access control. Through checking the rules, information can flow bidirectionally. The security of the model is proved on the basis of noninterference theory.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第5期694-697,共4页 Journal of Beijing University of Technology
基金 国家'九七三'发展规划项目资助(2007CB307101) 国家'八六三'高技术研究发展计划项目资助(2007AA01Z410 2007AA01Z177 2009AA012437) 长江学者和创新团队发展计划项目资助(IRT0707) 国家自然科学基金项目资助(60973112) 北京工业大学博士启动基金项目资助(X0007999200901)
关键词 多级安全 访问控制 机密性 完整性 灵活性 multilevel security access control confidentiality integrity flexibility
  • 相关文献

参考文献8

二级参考文献35

  • 1季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 2何建波,卿斯汉,王超.对一类多级安全模型安全性的形式化分析[J].计算机学报,2006,29(8):1468-1479. 被引量:10
  • 3何建波,卿斯汉,王超.对两个改进的BLP模型的分析[J].软件学报,2007,18(6):1501-1509. 被引量:22
  • 4Ott A. Regel-Basierte zugriffskontrolle nach dem Generalized framework for access controlansatz am beispiel Linux. Diplomarbeit Universitat Hamburg, 1997.
  • 5Shi WC. Research on and enforcement of methods of secure operating systems development. [Ph.D. Thesis] Beijing: Institute of Software, The Chinese Academy of Sciences, 2001 (in Chinese with English abstract).
  • 6Mayer FL. An interpretation of refined Bell-LaPadula model for the TMach kernel. In: Proc. of the 4th Aerospace Computer Security Applications Conf. IEEE Computer Society Press, 1988. 368-378.
  • 7Lunt T, Denning D, Schell R, Heckman M, Shockley W. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593-607.
  • 8Bell DE, La Padula LJ. Secure computer system: Unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1,1976.
  • 9Schell RR, Tao TF, Heckman M. Designing the GEMSOS security kernel for security and performance. In: Proc. of the 8th National Computer Security Conf. 1985. 108-119.
  • 10Lee TMP. Using mandatory integrity to enforce commercial security. In: Proc. of the IEEE Symp. on Security and Privacy. IEEE Computer Society Press, 1988. 140-146.

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部