首页 | 本学科首页   官方微博 | 高级检索  
     

基于可信计算的保密和完整性统一安全策略
引用本文:黄强,沈昌祥,陈幼雷,方艳湘.基于可信计算的保密和完整性统一安全策略[J].计算机工程与应用,2006,42(10):15-18.
作者姓名:黄强  沈昌祥  陈幼雷  方艳湘
作者单位:1. 海军工程大学电子系,武汉,430072
2. 海军计算技术研究所,北京,100841
3. 武汉大学计算机学院,武汉,430072
4. 南开大学信息科学技术学院,天津,300071
基金项目:国家重点基础研究发展计划(973计划)
摘    要:为解决在高安全等级操作系统应用的保密性/完整性统一多级访问控制模型可用性差问题及增强其安全性,为系统引入可信计算(TCPA)技术并指出它对安全机制的增强作用。对可信计算平台环境下保密性/完整性统一的访问控制模型中可信主体的特性进行描述,给出具体安全策略。它将可信主体纳入访问控制模型,有助于划分可信主体并能够限制其权限。

关 键 词:可信计算  可信主体  BLP模型  BIBA模型
文章编号:1002-8331-(2006)10-0015-04
收稿时间:2006-01-01
修稿时间:2006-01-01

Secrecy/Integrity Union MLS Policy Based on Trusting Computing
Huang Qiang,Shen Changxiang,Chen Youlei,Fang Yanxiang.Secrecy/Integrity Union MLS Policy Based on Trusting Computing[J].Computer Engineering and Applications,2006,42(10):15-18.
Authors:Huang Qiang  Shen Changxiang  Chen Youlei  Fang Yanxiang
Affiliation:1Department of Electronics,Naval University of Engineering,Wuhan 430072; 2Naval Institute of Computing Teehnology,Beijing 100841; 3College of Computer,Wuhan University,Wuhan 430072; 4College of Information Technical Seienee,Nankai University,Tianjin 300071
Abstract:Combining BLP and BIBA model in a MLS policy will leed to poor availability.To resolve it and enhance the security mechanism in the environment of high level security system,TCPA's trusted computing platform is applied to construct new security policy named S/IMLS.S/IMLS is based on the mechanism and function provided by TCPA.It defines the concept of trusted subjects by behavior and confines their abilities,which increases simplicity and availability for the system.
Keywords:trusted computing  trusted subjects  BLP model  BIBA model
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号