期刊文献+

BLP安全模型及其发展 被引量:11

BLP model and its evolution
在线阅读 下载PDF
导出
摘要 经典的BLP模型是在计算机安全系统中实现多级安全性支持的基础,被视作基本安全公理 BLP模型采用"强制存取控制"和"自主存取控制"来实现其安全性 总结了BLP模型的"公理化描述"、"有限状态机模型描述"和"信息流的格模型描述"三种不同描述方法,分析了其BLP模型目前存在的安全缺陷主要是:安全级定义的不完备性、信息完整性缺陷、时域安全性缺陷和隐通道 在对BLP模型的改进中。 The classical BLP model is the base of multi-level system and is treated as a basic axiom within computer security. BLP model adopts MAC and DAC to implement its security characters. Three representation methods of BLP model:axiom representation, finite-state machine representation and information flow lattice model representation are summarized. It is found that four main defects in BLP model exist, that are, incompleteness of security level definition, disintegrality of information, defect of time domain security and defect of covert channel. BLDM and MBLP model are two influential improvements over BLP model.
出处 《江苏大学学报(自然科学版)》 EI CAS 2004年第1期68-72,共5页 Journal of Jiangsu University:Natural Science Edition
基金 国家自然科学基金资助项目(60373069) 江苏省自然科学基金资助项目(BK200204)
关键词 安全模型 安全策略 BLP security model security policy BLP
  • 相关文献

参考文献16

  • 1[1]Bell D E, La Padula L J. Secure computer system: Unified exposition and MULTICS interpretation[R]. The MITRE Corporation, TechRep: MTR-2997 Revision 1, 1976.
  • 2[2]Lin Bell T Y, LaPadula Axioms. A "new" paradigm for an "old" model[J]. ACM,1993,82-93.
  • 3[3]Denning D E. A lattice model of secure informationflow[J].Communications of the ACM,1976,19(5):236-243.
  • 4[4]Gregory R Andrews, Richard P Reitman. An axiom axiomatic approach to information flow in programs[J].ACM Transaction on Programming Languages and System,1980,2(1):56-76.
  • 5[5]Dorothy E Denning, Peter J Denning. Certification of programs for secure information flow[J]. Communications of the ACM,1977,20(7):504-513.
  • 6[6]Cohen E. Information transmission in computational systems[A]. In:Operating System Principles[C]. Proc 6th Syrup,1977,11:133-139.
  • 7[7]Jones A K, Lipton R J. The enforcement of security policies for computation[A]. In:Operating System Principles[C].Proc 5th Syrup,1975,11:197-206.
  • 8[8]John McHugh. Covert channel analysis: a chapter of the handbook for the computer security certification of trusted systems[R]. Portland State University, 1995.
  • 9[9]Lin T Y. Probabilistic measure on aggregation[A]. In:Security Application Conference[C].Proceeding of 6th Annual Computer, 1990.
  • 10[10]Steven T Eckmann. Eliminating formal flows in automated information flow analysis[J].IEEE,1994:30-38.

同被引文献62

引证文献11

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部