A multi-level security model based on trusted computing

被引:0
|
作者
Jia, Zhao [1 ]
Liu Ji-qiang [1 ]
Jing, Chen [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] CIeNET Technol Co Ltd, Beijing 100044, Peoples R China
关键词
multi-level security model; trusted computing; confidential level; integrity level; trusted subject; the least privilege;
D O I
10.1109/ISDPE.2007.71
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some secure models protect the confidentiality and some secure models protect the integrity. How to combine the two types secure models faultlessly is still a problem. At present, a serious of secure models protect both confidentiality and integrity are based on the privilege subject, but it does not satisfy the least privilege principle. In the paper a multi-level security model based on trusted computing is proposed, and it can limit the privilege of subjects efficiently.
引用
收藏
页码:448 / +
页数:2
相关论文
共 50 条
  • [1] A Novel Duality and Multi-Level Security Model Based on Trusted State
    Liu, WeiPeng
    INFORMATION AND AUTOMATION, 2011, 86 : 730 - 738
  • [2] A Container-based Trusted Multi-level Security Mechanism
    Li, Xiao-Yong
    Ji, Chen
    Liu, Gang
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (IST 2017), 2017, 11
  • [3] Multi-level security model with least privilege support for trusted subject
    National Engineer and Research Center for Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Ruan Jian Xue Bao, 2007, 3 (730-738):
  • [4] Multi-level Security System Verification Based on the Model
    Stasiak, Andrzej
    Zielinski, Zbigniew
    ENGINEERING SOFTWARE SYSTEMS: RESEARCH AND PRAXIS, 2019, 830 : 69 - 85
  • [5] Big Data Privacy Protection Model Based on Multi-level Trusted System
    Zhang, Nan
    Liu, Zehua
    Han, Hongfeng
    6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
  • [6] An Action Based Access Control Model for Multi-level Security
    Su, Mang
    Li, Fenghua
    Shi, Guozhen
    Li, Li
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 359 - 366
  • [7] Security communication model for vehicular clouds based on trusted computing
    Zhang, Wenbo
    Bao, Zhenshan
    Li, Jian
    Zhan, Jing
    Zhang, Wenbo (zhangwenbo@bjut.edu.cn), 1600, Huazhong University of Science and Technology (42): : 102 - 105
  • [8] Network security audit multi-level model BrosaAudit
    School of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Jisuanji Gongcheng, 2006, 10 (159-160+163):
  • [9] Multi-Level security model in distributed database systems
    Bakir, Cigdem
    Guclu, Mehmet
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2022, 28 (02): : 266 - 276
  • [10] Implementation and validation of a multi-level security model architecture
    Edwards, D.
    Srivastava, S. K.
    Cartes, D. A.
    Simmons, S.
    Wilde, N.
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS APPLICATIONS TO POWER SYSTEMS, VOLS 1 AND 2, 2007, : 568 - +