基于格的可信计算模型  被引量:5

Trusted computing model based on lattice

在线阅读下载全文

作  者:马新强[1] 黄羿[1] 

机构地区:[1]重庆文理学院计算机学院,重庆402160

出  处:《通信学报》2010年第S1期105-110,共6页Journal on Communications

基  金:国家自然科学基金资助项目(90718009);贵州省国际科技合作计划基金资助项目(黔科合外G字[2010]7026号);贵州省科学技术基金项目(黔科合J字[2010]2104);重庆文理学院项目基金资助项目(Y2009JS57;68;69)~~

摘  要:为了保障信息的机密性和完整性,对信息的访问和操作,一般需要遵循一定的安全策略。BLP模型只解决了机密性问题,而Biba模型只解决了完整性问题,其他模型也都类似,无法使二者同时兼顾。基于可信模型的敏感标记集合在数学上应形成格的理论,提出了一种融合以上2种模型信息流的格安全模型,可以同时保持信息机密性与完整性。通过构建新的信息流格模型,将推动信息安全模型的理论研究。In the computer information systems,in general,some security strategies to access and handle information to protect the confidentiality and integrity of information were followed.The BLP model only solved the confidentiality problem,and the Biba model only solved the integrity problem,the others were similar.It couldn’t give attention to both sides at the same time.Based on the set of sensitivity labels for security model coming into being lattice order theory in math,a lattice security model was proposed,which was combined BLP model and Biba model of information flow.The lattice security model could keep the confidentiality and integrity of the information at the same time.The information security model theory research will be developed through the constructing of the new model of information flow lattice.

关 键 词:可信计算模型  BLP模型 BIBA模型 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象