计算机与现代化 ›› 2013, Vol. 1 ›› Issue (4): 193-197.doi: 10.3969/j.issn.1006-2475.2013.04.048

• 信息安全 • 上一篇    下一篇

改进的BLP模型的建模及其应用

徐 亮1,2   

  1. 1.湖南师范大学数学与计算机科学学院,湖南 长沙 410081;2.高性能计算与随机信息处理省部共建教育部重点实验室,湖南 长沙 410081
  • 收稿日期:2012-11-30 修回日期:1900-01-01 出版日期:2013-04-17 发布日期:2013-04-17

Modeling of Improved BLP Model and Its Applications

XU Liang1,2   

  1. 1. College of Mathematics and Computer Science, Hunan Normal University, Changsha 410081, China;2. Key Laboratory of High Performance Computing and Stochastic Information Processing, Ministry of Education, Changsha 410081, China
  • Received:2012-11-30 Revised:1900-01-01 Online:2013-04-17 Published:2013-04-17

摘要: BLP模型是经典的数据机密性模型,也是高等级安全操作系统研发过程中最常使用的一种安全策略模型。但是由于模型自身存在的不足,使得它无法满足实际系统开发的需求。通过对其做相应的改进,并对其做完全形式化的描述,将其应用到具体的系统当中,从而满足《信息安全技术——操作系统安全技术要求》(《GB/T 20272-2006》)中对“访问验证保护级”安全操作系统研发过程中提出的需要完全形式化的安全策略模型的需求。

关键词: BLP模型, 安全策略, 形式化, 安全迁移规则, 安全操作系统

Abstract: Bell-La Padula (BLP) model is a classical data confidentiality model and is often used as a security policy model in the researches of high-grade secure operating systems. But as its own shortages, it is hard to satisfy the requirement of development in actual systems. By doing the corresponding improvement and formal description, it can be used in actual systems and also satisfies the requirement of formal security policy model in the development of access verification and protection level of secure operating systems according to the “Information security technology: Security techniques requirement for operating system” (GB/T 20272-2006).

Key words: BLP model, security policy, formal method, secure transition rule, secure operating system

中图分类号: