Computer and Modernization ›› 2013, Vol. 1 ›› Issue (4): 193-197.doi: 10.3969/j.issn.1006-2475.2013.04.048

• 信息安全 • Previous Articles     Next Articles

Modeling of Improved BLP Model and Its Applications

XU Liang1,2   

  1. 1. College of Mathematics and Computer Science, Hunan Normal University, Changsha 410081, China;2. Key Laboratory of High Performance Computing and Stochastic Information Processing, Ministry of Education, Changsha 410081, China
  • Received:2012-11-30 Revised:1900-01-01 Online:2013-04-17 Published:2013-04-17

Abstract: Bell-La Padula (BLP) model is a classical data confidentiality model and is often used as a security policy model in the researches of high-grade secure operating systems. But as its own shortages, it is hard to satisfy the requirement of development in actual systems. By doing the corresponding improvement and formal description, it can be used in actual systems and also satisfies the requirement of formal security policy model in the development of access verification and protection level of secure operating systems according to the “Information security technology: Security techniques requirement for operating system” (GB/T 20272-2006).

Key words: BLP model, security policy, formal method, secure transition rule, secure operating system

CLC Number: