首页 | 本学科首页   官方微博 | 高级检索  
     

经典BLP安全公理的一种适应性标记实施方法及其正确性
引用本文:石文昌,孙玉芳,梁洪亮.经典BLP安全公理的一种适应性标记实施方法及其正确性[J].计算机研究与发展,2001,38(11):1366-1372.
作者姓名:石文昌  孙玉芳  梁洪亮
作者单位:中国科学院软件研究所,北京,100080;北京中科红旗软件技术有限公司,北京,100086
基金项目:国家自然科学基金项目 ( 60 0 730 2 2 ),国家“八六三”高技术研究发展计划项目 ( 863-30 6-ZD12-14 -2 ),中国科学院知识创新工程项目 ( KGCX1-0 9)资助
摘    要:经典的 Bell & L a Padula( BL P)模型是在计算机安全系统中实现多级安全性 ( ML S)支持的基础 ,被视作基本安全公理 .结合以 L inux为基础的一个安全操作系统 ( RS- L inux)的开发 ,讨论抽象的 BL P安全公理在安全操作系统实现中的实际意义 .从理论上构造 BL P公理的一种新的实施方法 ( ABL P方法 ) ,并给出该方法的正确性证明 .ABL P方法主要由 3条访问控制规则构成 ,其特点是允许主体的当前敏感标记进行适应性调整 ,它以常规实施方法为基础 ,克服了常规实施方法在标记指派方面的不足 ,为安全判定增加了灵活性 .

关 键 词:计算机安全  Linux  适应性标记  BLP安全公理  操作系统

AN ADAPTABLE LABELING ENFORCEMENT APPROACH AND ITS CORRECTNESS FOR THE CLASSICAL BLP SECURITY AXIOMS
SHI Wen-Chang,SUN Yu-Fang,and LIANG Hong-Liang.AN ADAPTABLE LABELING ENFORCEMENT APPROACH AND ITS CORRECTNESS FOR THE CLASSICAL BLP SECURITY AXIOMS[J].Journal of Computer Research and Development,2001,38(11):1366-1372.
Authors:SHI Wen-Chang  SUN Yu-Fang  and LIANG Hong-Liang
Abstract:The classical Bell & LaPadula (BLP) model, upon which the implementation of multilevel security (MLS) support in secure computer systems is based, is recognized as fundamental security axioms. With the development of a secure operating system, named RS-Linux, which is based on the Linux system, the practical significance of the abstract BLP security axioms in the implementation of a secure operating system is discussed. A new enforcement approach, named ABLP approach, for the BLP axioms is constructed theoretically. The correctness of the ABLP approach is proved. The ABLP approach, whose distinct characteristic is the adaptability of the current sensitivity label of a subject, mainly consists of three access control rules. It is an improvement on the basis of the ordinary enforcement approaches. Specifically, it overcomes the deficiencies of the ordinary enforcement approaches in subject label assignment and provides good flexibility for security decision.
Keywords:Bell & LaPadula  computer security  model  axiom  Linux  implementation  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号