A multi-level security model based on trusted computing

被引:0
|
作者
Jia, Zhao [1 ]
Liu Ji-qiang [1 ]
Jing, Chen [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] CIeNET Technol Co Ltd, Beijing 100044, Peoples R China
关键词
multi-level security model; trusted computing; confidential level; integrity level; trusted subject; the least privilege;
D O I
10.1109/ISDPE.2007.71
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some secure models protect the confidentiality and some secure models protect the integrity. How to combine the two types secure models faultlessly is still a problem. At present, a serious of secure models protect both confidentiality and integrity are based on the privilege subject, but it does not satisfy the least privilege principle. In the paper a multi-level security model based on trusted computing is proposed, and it can limit the privilege of subjects efficiently.
引用
收藏
页码:448 / +
页数:2
相关论文
共 50 条
  • [31] A security model to protect sensitive information flows based on trusted computing technologies
    Wang, Shi-Hua
    Li, Xiao-Yong
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3646 - +
  • [32] Speedup for Multi-Level Parallel Computing
    Tang, Shanjiang
    Lee, Bu-Sung
    He, Bingsheng
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 537 - 546
  • [33] Extending linux for multi-level security
    Wilson, George
    Weidner, Klaus
    Salem, Loulwa
    PROCEEDINGS OF THE THIRD ANNUAL SECURITY ENHANCED LINUX SYMPOSIUM, 2007, : 101 - 109
  • [34] Multi-level security requirements for hypervisors
    Karger, PA
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 240 - 248
  • [35] The Multi-level Security for the Android OS
    Oh, Ji-Soo
    Park, Min-Woo
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 743 - +
  • [36] Multi-Level network security architecture
    Luo, J.Z.
    Liu, Y.Y.
    2001, Chinese Academy of Sciences (12):
  • [37] Multi-level data security program based on quantum key
    Zhu, De-Xin
    Li, Xin-Jian
    An, Ya-Ting
    Zhou, Jun-Wei
    Huang, Qi-Yuan
    Li, Xiao-Hui
    Wu, Jia-Nan
    Song, Li-Jun
    Journal of Computers (Taiwan), 2021, 32 (02) : 164 - 175
  • [38] Bacteriorhodopsin-based multi-level optical security features
    Hampp, N
    Neebe, M
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES VI, 2006, 6075
  • [39] OCDM-based all optical multi-level security
    Etemad, Shahab
    Agarwal, Anjali
    Habiby, Sarry
    Jackel, Janet
    Menendez, Ron
    Toliver, Paul
    2007 IEEE AVIONICS, FIBER-OPTICS AND PHOTONICS TECHNOLOGY CONFERENCE, 2007, : 30 - 31
  • [40] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X