首页> 外文会议>IEEE international SOI conference >Simultaneous enforcement of the Bell-LaPadula and the Biba securitypolicy models in an OSI-distributed system
【24h】

Simultaneous enforcement of the Bell-LaPadula and the Biba securitypolicy models in an OSI-distributed system

机译:在OSI分布式系统中同时执行Bell-LaPadula和Biba安全策略模型

获取原文

摘要

The article concentrates on enforcing security policies on adistributed basis. More specifically, the Biba and the B-LP securitypolicies are addressed. Key-distributions are analysed which are inconformance with the two policies. It turned out that the Biba and theB-LP models can be enforced if the OSI-RM communication subsystem ofeach end-system is equipped with one key-pair of a public key system(PKS). If no end-system were broken, then the key-pair in everyend-system may be the same. In that case however, the consequences ofbreaking an end-system are disastrous. A key-distribution where eachend-system is equipped with a (different) key-pair is much moreresistant against breaking an end-system: in that case the consequencesof breaking an end-system can be as limited as possible. Besides, thelatter key-distribution enables identification and exclusion of thebroken end-system. Consequently, the other end-systems can go oncommunicating according to their respective security policies as theydid before
机译:本文重点介绍如何在服务器上执行安全策略。 分布式基础。更具体地说,Biba和B-LP安全性 政策得到解决。分析密钥分布 符合这两项政策。原来,Biba和 如果OSI-RM通信子系统的B-LP模型可以执行 每个终端系统都配备有一对公钥系统的密钥对 (PKS)。如果没有任何终端系统损坏,那么每个 终端系统可能是相同的。但是,在那种情况下, 破坏终端系统是灾难性的。一个密钥分布,其中每个 终端系统配备了(不同的)密钥对,这要多得多 耐破坏终端系统:在这种情况下,后果 破坏终端系统的数量可能会受到尽可能的限制。此外, 后一种密钥分发可以识别和排除 终端系统损坏。因此,其他终端系统可以继续运行 他们根据各自的安全策略进行通信 以前做过

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号