期刊文献+

一种云计算环境下的安全模型 被引量:6

A Security Model Adapted in Cloud Computing
下载PDF
导出
摘要 本文针对当前流行的云计算技术,分析了其所面临的安全问题。以中国墙模型(简称BN模型)为基础提出了保护云端服务器私有云中敏感数据完整性和保密性的CCBN(cloud computing BN)模型,并给出了该模型的基本原理和在云环境中应用该模型的配置方案。 In this paper, we analyzed some security problems in cloud computing. Based on Chinese wall model (BN model), a new security model named CCBN(cloud computing BN) was put forward, which can be used to protect data integrity and secrecy in private cloud. Then, we explained the elements and configuration scheme in cloud computing with CCBN model.
作者 林果园 贺珊
出处 《电信科学》 北大核心 2010年第9期95-99,共5页 Telecommunications Science
基金 江苏省自然科学基金资助项目(No.BK2007035) 中国矿业大学青年基金资助项目(No.0D061035 No.2007A047)
关键词 云计算 中国墙模型 CCBN模型 cloud computing, Chinese wall model, CCBN model
  • 相关文献

参考文献7

  • 1Michael M. Cloud computing: web-based applications that change the way you work and collaborate online, 2009.
  • 2Brewer D, Nash M. The Chinese wall security policy. In: Proc of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, 1989.
  • 3Bell K, LaPadula L J. Secure computer systems: unified exposition and muhics interpretation. MITRE Corporation ,Tech Rep: MTR-2997, 1976.
  • 4Biba K J. Integrity considerations for secure computer systems. Technical Report MTR 3153. The Mitre Corporation, 1977.
  • 5Clark D, Wilson D. A comparison of commercial and military security policies. In: Proc of the '87 IEEE Symp on Security and Privacy, 1987.
  • 6何永忠,李晓峰,冯登国.RBAC实施中国墙策略及其变种的研究[J].计算机研究与发展,2007,44(4):615-622. 被引量:10
  • 7Philip W L Fong. Access control by tracking shallow execution history. In: Proc of the 2004 IEEE Symp on Security and Privacy, Los Alamitos, 2004.

二级参考文献8

  • 1D Brewer,M Nash.The Chinese Wall security policy[C].In:Proc of the IEEE Symposium on Research in Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,1989.206-214
  • 2K Bell,L J LaPadula.Secure computer systems:Unified exposition and multics interpretation[R].MITRE Corporation,Tech Rep:MTR-2997,1976
  • 3R Sandhu.A lattice interpretation of the Chinese wall policy[C].In:Proc of the 15th NIST-NCSC National Computer Security Conference.Washington:United States Government Printing Office,1992.329-339
  • 4R S Sandhu,E J Coyne,H L Feinstein,et al.Role-based access control[J].IEEE Computer,1996,29(2):38-47
  • 5S Osborn,R Sandhu.Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Trans on Information and System Security,2000,3(2):85 -106
  • 6Q Zhao,Y Sun.Configuring role-based access control to enforce Chinese Wall policy[C].The 6th Int'l Conf for Yonger Computer Scientists,Hangzhou,2001
  • 7Philip W L Fong.Access control by tracking shallow execution history[C].In:Proc of the 2004 IEEE Symp on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,2004.43-55
  • 8G-J Ahn,R Sandhu.Role-based authorization constraints specification[J].ACM Trans on Information and System Security,2000,3(4):207-226

共引文献9

同被引文献31

  • 1阮洁珊.计算机网络云计算技术浅析[J].科协论坛(下半月),2009(7):49-49. 被引量:11
  • 2Brewer D F C,Nash M J.The Chinese Wall Security Policy[C] //Proceedings of the 1989 IEEE Symposium on Security and Privacy.Oakland,CA,USA,1989.
  • 3Bell D E,LaPadula L.Secure Computer System:Unified Exposition and Multics Interpretation[R].ESD-TR-75-306.Electronics Systems Division,AFSC,Hanscom AF Base,Bedford MA,1976.
  • 4Biba K.Integrity Considerations for Secure Computer System[R].MTR-3153.The MITRE Corporation,Bedford,MA,1977.
  • 5Hay B,Nance K,Bishop M.Storm Clouds Rising:Security Challenges for IaaS Cloud Computing[C] //Proceedings of the 44thHawaii International Conference on System Sciences.Hawaii,US,2011.
  • 6Wu Ruo-yu,Ahnl G-J,Hul Hong-xin,et al.Information Flow Control In Cloud Computing[C] //Collaborative Computing:Networking,Applications and Worksharing.Chicago,Illinois,USA,2010.
  • 7Reuben J S.A Survey on Virtual Machine Security[Z].Seminar on Network Security.
  • 8Ristenpart T,Tromer E,Shacham H,et al.Get Off of My Cloud:Exploring Information Leakage in Third-Party Compute Clouds[C] //Proceedings of the 16th ACM Conference on Computer and Communications Security.Chicago,Illinois,USA,November 2009.
  • 9赵鹏宇,刘丰,张宏莉,王爽.大规模网络安全态势评估系统[J].计算机工程与应用,2008,44(33):122-124. 被引量:9
  • 10陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1312

引证文献6

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部