- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
Lattice-Based Access Control Models-英文文献
IEEE Computer, Volume 26, Number 11, November 1993, p ages 9-19
(Cover article).
Lattice-Based Access Control Mo dels1
Ravi S. Sandhu
Center for Secure Information Systems
Department of Information and
Software Systems Engineering
George Mason University
Fairfax, Virginia 22030
email: sandhu@sitevax.gmu.edu
voice: 703-993-1659
fax: 703-993-1638
Abstract The ob jective of this article is to give a tutorial on lattice-based
access control mo dels for computer security. The pap er b egins with a review
of Dennings axioms for information
ow p olicies, which provide a theoretical
foundation for these mo dels. The structure of security lab els in the military and
government sectors, and the resulting lattice is discussed. This is followed by a
review of the Bell-LaPadula mo del, which enforces information
ow p olicies by
means of its simple-security and ? -prop erties. It is noted that information
ow
through covert channels is b eyond the scop e of such access controls. Variations
of the Bell-LaPadula mo del are considered. The pap er next discusses the Biba
integrity mo del, examining its relationship to the Bell-LaPadula mo del. The
pap er then reviews the Chinese Wall p olicy, which arises in a segment of the
commercial sector. It is shown how this p olicy can b e enforced in a lattice
framework.
K
您可能关注的文档
- Formal Ontology and Information Systems-英文文献.pdf
- Financial Dependence and Growth-英文文献.pdf
- From System F to Typed Assembly Language-英文文献.pdf
- Free-form deformation of solid geometric models-英文文献.pdf
- Functions from a set to a set-英文文献.pdf
- Games with Incomplete Information Played by 'Bayesian' Players, I-III-英文文献.pdf
- Gaussian processes for machine learning-英文文献.pdf
- Generation and Synchronous Tree-Adjoining Grammars-英文文献.pdf
- Generating Representative Web Workloads for Network and Server Performance Evaluation-英文文献.pdf
- Generic Schema Matching with Cupid-英文文献.pdf
- Linear pattern matching algorithms-英文文献.pdf
- Learning low-level vision-英文文献.pdf
- Link-level Measurements from an 802.11b Mesh Network-英文文献.pdf
- Liquidity Risk and Expected Stock Returns-英文文献.pdf
- Literate programming-英文文献.pdf
- Location-Aided Routing (LAR) in mobile ad hoc networks-英文文献.pdf
- Macroscopic strings as heavy quarks in large N gauge theory and Anti-de Sitter supergravity-英文文献.pdf
- Maintaining knowledge about temporal intervals-英文文献.pdf
- Making Large-Scale Support Vector Machine Learning Practical-英文文献.pdf
- Managerial Incentive Problems -- A Dynamic Perspective-英文文献.pdf
文档评论(0)