期刊文献+

基于可信验证的DBMS访问控制模型

Credible validation based DBMS access control model
在线阅读 下载PDF
导出
摘要 针对目前访问控制模型在系统的安全实现方面存在的不足,在RABC的基础上,提出了可信操作环境下基于可信验证的DBMS访问控制模型,该模型满足系统的保密性和完整性需求,最大程度实现信息双向流动,同时支持最小特权安全特性,是一个权限分配灵活的访问控制模型。 Actual access control model can't realize the system's security effectively.It presents an access control model for DBMS based on credible validation in trusted operation environment.The model can satisfy the system's requirements of security and integrality,realize the bidirectional flow of information at most,and also support the least privilege security characteristic.It is a flexible access control model on privilege distributing.
作者 牟亚莉 曾浩
出处 《计算机工程与应用》 CSCD 北大核心 2008年第4期179-181,218,共4页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)(the National High- Tech Research and Development Plan of China under Grant No.2006AA01Z440)
关键词 安全数据库管理系统 可信操作环境 访问控制 可信验证 DBMS trusted operation environment access control trusted validation~~ ,. ~ ~ ,~ L~ ,^- ~ ,J
  • 相关文献

参考文献8

  • 1Shen Changxiang.Active-defending security assurance framework[J]. Chinese Information Review,2003,10:50-51.
  • 2Trusted Computing Group.TCG specification architecture overview specification revision 1.2[EB/OL].[2004].https://www.trustedcomputinggroup.org.
  • 3ANSI INCITS 359-2004.Role based access control [S].American National Standard for Information Technology,2004.
  • 4Goh C, Baldwin A.Towards a more complete model of role[C].Proceedings of Third ACM Workshop on Role-Based Access Control. Fairfax, Virginia, 1998 : 55-61.
  • 5Sushi J ajodia,Pierangela Samarati, Maria Luisa Sapino.Subrahmanian.flexible support for multiple access control policies [J].ACM Trans Database Syst,2001,26(2):214-260.
  • 6刘文清,卿斯汉,刘海峰.一个修改BLP安全模型的设计及在SecLinux上的应用[J].软件学报,2002,13(4):567-573. 被引量:14
  • 7Biba K J.Integrity considerations for secure computer systems Technical Report MTR-3153 [R].Bedford,MA,USA:Mitr Corporation, 1977.
  • 8handramouli R C,Sandhu R.Role based access control features in commercial database management systems[C].21st National Information Systems Security Conference,Crystal City,Virginia,October 6-9,1995.

二级参考文献7

  • 1Millen,J.K.,Cerniglia,C.M.Computer security models.MTR-9531.Bedford,MA.: Mitre Corp.,1984.
  • 2Landwehr,C.E.Formal model for computer security.Computer Surveys,1981,13(3):247~278.
  • 3Bell,D.E.,La Padula,L.J.Secure computer systems: mathematical foundations.ESD-TR-73-278,Ⅰ(AD)770 768,Electronic Systems Division,Air Force System Command,Hanscom AFB,Bedford,MA,1973.
  • 4Bell,D.E.,La Padula,L.J.Secure computer systems: a mathematical model.ESD-TR-73-278,Ⅱ(AD)771 543,Electronic Systems Division,Air Force System Command,Hanscom AFB,Bedford,MA,1973.
  • 5Bell,D.E.,La Padula,L.J.Secure computer systems: a refinement of the mathematical foundations.ESD-TR-73-278,Ⅲ(AD)780 528,Electronic Systems Division,Air Force System Command,Hanscom AFB,Bedford,MA,1974.
  • 6Date General Corporation.Managing Security on the Trusted DG/UXTM System (093-701038).Westboro,MA,1994.
  • 7Yang,Tao.The Research and design of a secure OP--S_UNIX [Ph.D.Thesis].Changsha: National University of Defence Technology,1993 (in Chinese).

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部