期刊文献+

BLP模型的时域安全研究 被引量:1

Research on the time-dimain security of BLP model
下载PDF
导出
摘要 对BLP(Bell-LaPadula)模型在时域的安全特性进行了深入分析,指出一种在时域上对BLP模型的错误理解,并给出新的模型安全性证明,表明BLP模型在时域上符合机密性要求,不存在安全漏洞。 Based on a thorough research on the time-domain security of BLP(Bell-LaPadula) model, an incorrect understanding on the time-domain security of BLP model was pointed out, and a new theoretical proof about the time-domain security of BLP model was given. The BLP model accords well with the requirement of confidentiality was indicated,
出处 《计算机应用》 CSCD 北大核心 2005年第12期2723-2724,共2页 journal of Computer Applications
基金 国家973资助项目(1999035801)
关键词 BLP(Bell-LaPadula)模型 强制访问控制 机密性 BLP(Bell-LaPadula) model Mandatory Access Control(MAC) confidentiality
  • 相关文献

参考文献6

  • 1BELL DE,LAPADULA LJ.Secure Computer Systems: Unified Exposition and Multics Interpretation[R]. The Mitre Corporation,1976.
  • 2王玮.Bel La Padula模型的时域安全分析[J].计算机研究与发展,1997,34(2):149-152. 被引量:4
  • 3MCLEAN J.The Specification and Modeling of Computer Security[J].Computer,1990,23(1).
  • 4MCLEAN J.Security Models, Encyclopedia of Software Engineering[M]. Wiley & Sons Inc.,1994.
  • 5KANG JM,SHIN W,PARK CG,et al.Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel[A].2001 Pacific Rim International Symposium on Dependable Computing[C].2001.299-303.
  • 6朱国华,卢正鼎,洪帆.BLP模型主体敏感标记动态调整方案及其正确性证明[J].小型微型计算机系统,2003,24(11):2012-2015. 被引量:6

二级参考文献3

  • 1D E Bell. L J La Padula, Secure computer system: Unified exposition and multics interpretation[R], The MITRE Corporation, TechRep: MTR-2997 Revision1,1976.
  • 2V D Gligor, E L Burch, C S ChanderSekaran et al. On the design and the implementation of Secure xenix work stations [C]. In: Proc of the 1986 IEEE Symposium On Security and Privacy. Oakland. California: IEEE Computer society PreSS. 1986. 102-117.
  • 3石文昌,孙玉芳,梁洪亮.经典BLP安全公理的一种适应性标记实施方法及其正确性[J].计算机研究与发展,2001,38(11):1366-1372. 被引量:28

共引文献7

同被引文献7

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部