A multi-level security model based on trusted computing

被引:0
|
作者
Jia, Zhao [1 ]
Liu Ji-qiang [1 ]
Jing, Chen [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] CIeNET Technol Co Ltd, Beijing 100044, Peoples R China
关键词
multi-level security model; trusted computing; confidential level; integrity level; trusted subject; the least privilege;
D O I
10.1109/ISDPE.2007.71
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some secure models protect the confidentiality and some secure models protect the integrity. How to combine the two types secure models faultlessly is still a problem. At present, a serious of secure models protect both confidentiality and integrity are based on the privilege subject, but it does not satisfy the least privilege principle. In the paper a multi-level security model based on trusted computing is proposed, and it can limit the privilege of subjects efficiently.
引用
收藏
页码:448 / +
页数:2
相关论文
共 50 条
  • [21] A UML model for multi-level security using the IPSEC ESP security protocol
    Morsi, W
    El-Fouly, T
    Badr, A
    ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 103 - 108
  • [22] A Novel Multi-level Security Policy Model for Protecting Documents
    Wang, Hui
    Jia, Zongpu
    Lu, Bibo
    Shen, Zihao
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 398 - 402
  • [23] Analysis and Improvement of BLP Model for Multi-level Security Database
    Zhao Hai-yan
    Liu Xiangyang
    Zhao Jing
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2536 - 2539
  • [24] Research on A Multi-Level Security Assessment Model for Mobile Internet
    Tao, Liu
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 3207 - 3211
  • [25] Comprehensive information security evaluation model based on multi-level decomposition feedback for IoT
    Zuo, Jinxin
    Lu, Yueming
    Gao, Hui
    Cao, Ruohan
    Guo, Ziyv
    Feng, Jim
    Computers, Materials and Continua, 2020, 65 (01): : 683 - 704
  • [26] Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT
    Zuo, Jinxin
    Lu, Yueming
    Gao, Hui
    Cao, Ruohan
    Guo, Ziyv
    Feng, Jim
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (01): : 683 - 704
  • [27] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [28] An information flow security model to trusted computing system
    Hu Jun
    Shen Changxiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +
  • [29] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [30] A novel trusted computing model for network security authentication
    Xing, Ling
    Jiang, Ling
    Yang, Guohai
    Wen, Bin
    Journal of Networks, 2014, 9 (02) : 339 - 343