期刊文献+

具有时空约束的强制访问控制模型 被引量:3

A Mandatory Access Control Model with Temporal and Spatial Constraints
原文传递
导出
摘要 传统的访问控制通过逻辑的方法来防止未授权的信息访问,忽略了物理位置的作用,从而容易遭受地址欺骗类攻击.将位置信息引入访问控制可以提供更好的安全性.在强制访问控制中客体的安全属性与时间密切相关,访问控制模型中应反映客体的安全属性随时间的变化.以经典的Bell-Lapadula模型为基础,提出一个具有时空约束的强制访问控制模型,综合考虑时间和空间约束,在增加访问控制模型灵活性的基础上提高访问控制模型的安全性. Traditional access control restrains unauthorized access only by logical method,which is vulnerable to suffer from address spoofing because of ignoring physical location.It can provide better security through introducing spatial information into access control.Security properties of objects are closely related to time in mandatory access control model.Therefore,the change of object's security property over time should be reflected in access control model.Based on classic Bell-Lapadula model(BLP),a mandatory access control model with temporal and spatial constraints is proposed,in which both time constraints and space constraints are considered.Compared to BLP model,the new model can provide better flexibility and security.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2012年第5期111-114,共4页 Journal of Beijing University of Posts and Telecommunications
基金 北京信息科技大学网络文化与数字传播北京市重点实验室开放课题 信息安全国家重点实验室(中国科学院软件研究所)开放课题
关键词 时空约束 强制访问控制 多级安全 temporal and spatial constraints mandatory access control multi-level security
  • 相关文献

参考文献7

  • 1Bell D E,LaPadula L J. Secure computer system ;unified exposition and multics interpretation [ R ].Bedford : MITRE Corporation, 1976.
  • 2范艳芳,韩臻,曹香港,何永忠.基于时间限制的多级安全模型[J].计算机研究与发展,2010,47(3):508-514. 被引量:10
  • 3Sandhu R, Coyne E J,Feinstein H L, et al. Role-basedaccess control models [ J ]. IEEE Computer, 1996,29(2):3847.
  • 4Kumar M, Newman R. Strbacan approach towardsspatio-temporal role-based access control [ C ]//Proceedings of the Third IASTED InternationalConference on Communication. Network : InformationSecurity, 2006: 150-155.
  • 5Ray I,Kumar M,Yu L. LRBAC : a location-aware role-based access control model [ C ] //Proceedings of the 2 ndInternational Conference on Information SystemsSecurity. Kolkata, India: Lecture Notes in ComputerScience, 2006; 147-161.
  • 6Bauer M,Becker C, Rothermel K. Location modelsfrom the perspective of context-aware applications andmobile Ad Hoc Networks [ J ]. Personal and UbiquitousComputing, 2002(6) ; 322-328.
  • 7Ray I,Kumar M. Towards a location-based mandatoryaccess control model[ J] . Computers & Security, 2006,25(1) ; 36-44.

二级参考文献15

  • 1蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 2季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 3谢钧,许峰,黄皓.基于可信级别的多级安全策略及其状态机模型[J].软件学报,2004,15(11):1700-1708. 被引量:19
  • 4武延军,梁洪亮,赵琛.一个支持可信主体特权最小化的多级安全模型[J].软件学报,2007,18(3):730-738. 被引量:14
  • 5Bell D E, LaPadula L J. Secure computer system: Unified exposition and Multics interpretation, MTR-2997 Rev. 1 [R]. Bedford, CA: MITRE Corporation, 1976.
  • 6Bell D E. Secure computer system: A retrospective [C] // Proe of the 1983 IEEE Syrup on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1983: 161-162.
  • 7Waldhart N A. The army secure operating system [C]//Proc of the IEEE Computer Society Symp Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1990: 50-60.
  • 8Lee T M P. Using mandatory integrity to enforce commercial security [C] //Proc of the IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 1988: 140-146.
  • 9Ott A. Rule Set Based Access Control as Proposed in the Generalized Framework for Access Control Approach in Linux [D]. Hamburg State: Universitat Hamburg, 1997.
  • 10Andrei S, David S. Dimensions and principles of declassification [C] //Proc of the IEEE Computer Security Foundations Workshop. Los Alamitos CA: IEEE Computer Society, 2005:255-269.

共引文献9

同被引文献25

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部