Affiliation:
1. Xi’an Communication College
Abstract
In the current multi-level security database system, the BLP model is the most widely used security model. For the problem of data redundancy, primary key loophole and reasoning channel of the BLP model, an improved method is proposed. The proposed method consummates the read-write level and the read-write range of user, increases the audit mechanism, eliminates the primary key loophole and avoids the reasoning channel to some extent. The proposed method in this paper improves the security of the BLP model and makes the security model more practical.
Publisher
Trans Tech Publications, Ltd.
Reference6 articles.
1. Tanliang Zhou. Journal of Electronic Science and Technology of China. (2006).
2. Lin A, Brown R. Computer Communications . (2000).
3. Robinson J C, Alves-Foss J. A high assurance MLS file server. ACMSIGOPS Operating System Review. (2007).
4. NIST. Minimum Security Requirements for Federal Information and Information Systems. (2006).
5. LIU Y H, CHEN X S. A New Information Security Model based on BLP Model and BibaModel. Proceedings of7th International Conference on Signal Processing . (2004).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献