《BLP模型的安全性分析与研究》由会员分享,可在线阅读,更多相关《BLP模型的安全性分析与研究(2页珍藏版)》请在金锄头文库上搜索。
1、 i157iBLPs !$+ (vni 100081) K 1 BLP K9)b BLP $i1J#Zs4oKaKp5r BLPb 1oM BLP Analysis and Research of the Security of BLP Model GU Qianjun, WANG Yue (President Office of Beijing Institute of Technology, Beijing 100081) AbstractBell-LaPadula model(BLP) model is the most classical multilevel computer sec
2、urity model. Based on the research of BLP model, thispaper analyzes the main defects in BLP model and different improving methods, puts forward a principle or “read the nearest and write the nearest”,improves the BLP model more effective security and integrity. Key wordsBell-LaPadula model(BLP); Mod
3、el; Security 9 Computer Engineering 32 22Vol.32 No.22 2006M 11 November 2006/ cI| 1000i3428(2006)22i0157i02 DSM A ms| TP309XH59mWn15b 5d!94b BLP 1 ClarkWilson 1 Denning i| Take-grant e (RBAC)HW PDR P2DR tzTbd!9HInyiJbS-Td!9HI BLP BLP ii1J-Zs4rnb 1 BLP e Bell-LaPadula (BLP ) D.E.Bell L.J.LaPadula 197
4、3 M7E+Y9 K*a9KB9)Kb BLP 18aZ8a)faadll 4 +4 10 !911 ?5TVUib BLP |8lL8 |Z8l$L8aq |8Z8sr( )aw( )aa(F )ae( )b BLP 1 (DAC) (MAC)b1PB MijVU8 Si Z8 Oj T8?vKZ8Mbe+FBt+d8Z8sB)8Z8)SdYV18Z8)e8Z8b BLP BTldad#W?5 PBdVB?5Vdb e+8Z8H8)AvZ8)b+aZ8b *-+TB8HZ8 1 4KZ8 2 K5Z8 1 )seZ8 2 )b+aV8b 1+BQi|Ti|Kb YZ8Q Yb+aZ8QZ8)
5、_=Z_9YTdcY1b 2 BLP iJ v BLP ?5iJ1)l!a aHYb (1)l!b8)B)BSF7y8H-)iO83=%MbZEVeC2b (2)b BLPo_p?58VK)K8K) Bt)Y)Y8i)Y8b?)YS=8?bBt)Y89VTe !$+ (1970)3pV3a=Z_ paV l 2005-12-15 E-mail i158i)Yb )Y)Y1b)Y)Y8 S T)Y)YZ8 O*Z8O sSU?3b (3)H :8BZ8HCHHCPb (4)YwK ,iY5b (5)V8so *-+pKvKl+5b 3 BLP %54 BLP ZYv1/ (1) T.Y.Lin b T.Y.Lin BLP1lQ BLP 4 HT 44 5BSOB ibB)b/B|ZEs 2 T 1)|) 2)|$T)bTqYVqddqBLP/V8?4b (2) Feiertag b Feiertag BLP