期刊文献+

基于无干扰理论的分布式多级安全核心架构 被引量:4

Distributed multilevel security core architecture based on noninterference theory
在线阅读 下载PDF
导出
摘要 为了提高分布式环境下多级安全实施的正确性和可行性,提出了一个分布式多级安全保护核心架构——分布式可信计算基(DTCB)。DTCB具有三层结构,包括系统层可信计算基、模块层可信计算基和分区层可信计算基,实现了从模块间、分区间到分区内部的逐步细化的信息流和访问控制,有效降低了分布式环境下多级安全实施的复杂性。最后,采用组合无干扰模型形式化证明了DTCB的安全性,结果表明,DTCB能够从整体上为分布式系统提供较好的多级安全保护。 To improve the correctness and feasibility of the implementation of multilevel security in the distributed environment, a distributed multilevel security core architecture -- Distributed Trusted Computing Base (DTCB) was proposed. DTCB was divided into three layers, TCB of System layer, TCB of Module layer and TCB of Partition layer, finer multilevel control granularity was realized step by step, greatly reducing the complexity of the implementation of multilevel security in the distributed environment. At last, based on the eomposable noninterference model, the security of DTCB was formally proved. The result shows that DTCB assures the multilevel security of distributed system as a whole.
出处 《计算机应用》 CSCD 北大核心 2013年第3期712-716,共5页 journal of Computer Applications
基金 国家973计划项目(2011CB311801) 国家863计划项目(2012AA012704) 河南省科技创新人才计划项目(114200510001)
关键词 多级安全 无干扰 可信计算基 分布式系统 架构 muhilevel security noninterference Trusted Computing Base (TCB) distributed system architecture
  • 相关文献

参考文献15

  • 1SAYDJARI 0 S. Multilevel security:reprise[J].Security & Privacy,2004,(05):64-67.
  • 2RUSHBY J. From DSS to MILS[M].Beilin:Springer-Verlag,2011.53-57.
  • 3BOETTCHER C,DELONG R,RUSHBY J. The MILS component integration approach to secure information sharing[A].Piscataway,NJ:IEEE Press,2008.1-12.
  • 4National computer security center. NCSC-TG-005,Trusted network interpretation[S].USA:Department of Defence,1987.
  • 5LU W P,SUNDARESHAN M K. A model for multilevel security in computer networks[J].IEEE Transactions on Software Engineering,1990,(06):647-659.doi:10.1109/32.55093.
  • 6VNADHARAJM V. A multilevel security policy model for networks[A].Washington,DC:IEEE Computer Society,1990.710-718.
  • 7LEVIN T E,IRVINE C E,WEISSMAN C. Analysis of three multilevel security architectures[A].New York:acm Press,2007.610-619.
  • 8FOSS J A,HARRISON W S,OMAN P. The MILS architecture for high-assurance embedded systems[J].International Journal of Embedded Systems,2006,(03):239-247.
  • 9LEVIN T E,IRVINE C E,NGUYEN T D. Least privilege in separation kernels[A].Piscataway,NJ:IEEE Press,2006.355-362.
  • 10LUO J,KANG M. Infrastructure for multi-level secure service-oriented architecture (MLS-SOA)[A].Piscataway,NJ:IEEE Press,2010.475-481.

同被引文献44

  • 1曾煊,陈翼,高珺.高校网站集群管理的应用与实践[J].武汉大学学报(理学版),2012,58(S1):287-292. 被引量:6
  • 2武少杰.云计算下虚拟环境安全的关键技术研究[D].郑州:解放军信息工程大学,2012.
  • 3LIN Guoyuan, BIE Yuyu, LEI Min, et al. ACO-BTM A Behavior Trust Model in Cloud Computing Environment [J]. International Journal of Computational Intelligence Systems, 2014, 7(4):785-795.
  • 4BELL D E, PADULA L J L. Unified Exposition and Multics Interpretation[R]. USA: Secure Computer System. MTR 2997 Rev 1, 1976.
  • 5Biba K J. Integrity Consideratiom for Secure Computer Systems[R]. USA: US Air Force Electronic System Division, Technical Report. MTR 3153, 1977.
  • 6MYERS A C, LISKOV B. Protecting Privacy Using the Decentralized Label Model [J]. ACM Transactiom on Computer Systems, 2000, 9(4):410-442.
  • 7SHI Q, ZHANG N. An effective model for composition of secure systems [J]. The Journal of Systems and Software, 1998, 43 (3) :233-244.
  • 8LU W P, SUNDARESHAN M K. A model for multilevel security in computer networks [J]. IEEE Transactions on Software Engineering, 1990, 16(6): 647-659.
  • 9LEVIN TE, IRVINE CE, NGUYEN TD. Least Privilege in Separation Kernels [C]//IEEE. Proceedings of the IEEE International Conference on Security and Cryptography. Piscataway, NJ: IEEE Press, 2006: 355-362.
  • 10RUSHBY J. Noninterference, Transitivity, and Channel-control Security Policies[R]. Menlo Park: Stanford Research Institute, CSL-92-02, 1992.

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部