BLP-based information security model in secure operating system

被引:0
|
作者
Huang, Yimin
Wang, Weizhen
机构
[1] College of Computer Science, Zhejiang University, Hangzhou 310027, China
[2] School of Business, Nanjing University, Nanjing 210093, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:133 / 135
相关论文
共 50 条
  • [1] A BLP-based Access Control Mechanism for the Virtual Machine System
    Weng, Chuliang
    Luo, Yuan
    Li, Minglu
    Lu, Xinda
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2278 - 2282
  • [2] A new information security model based on BLP model and Biba model
    Liu, YH
    Chen, XS
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2643 - 2646
  • [3] Extended BLP security model based on process reliability for secure Linux kernel
    Kang, JM
    Shin, W
    Park, CG
    Lee, DI
    2001 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2001, : 299 - 303
  • [4] Application of Modified BLP model on Mobile Web Operating System
    Zhu, Dali
    Yang, Ying
    Jin, Hao
    Shao, Jing
    Feng, Wei-Miao
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1818 - 1824
  • [5] An operating system trusted security model for important sensitive information system
    Zhao Yong
    Liu JiQiang
    Han Zhen
    Shen ChangXiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 465 - +
  • [6] Designing and modeling security architecture of a secure operating system
    Liang, HL
    Sun, YF
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 202 - 205
  • [7] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [8] A Network Business Security Model Based on Developed BLP Model in Electric Power Enterprise
    Zhang, Tong
    Wu, Kehe
    Ma, Gang
    Li, Wei
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (3B): : 63 - 66
  • [9] The information security system based on decision making model
    Hua, Hongxuan, 1600, Sila Science, University Mah Mekan Sok, No 24, Trabzon, Turkey (32):
  • [10] Multi-policy based application supporting model for secure operating system
    Chen, Zemao
    Shen, Changxiang
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (21):