Multilevel security access control model based on information flow

A security access control and security access technology, which is applied in the field of multi-level security access control model based on information flow, can solve the problems of strict restrictions on actual information flow transmission of the model, inability to apply information flow transmission, and small application scope, and achieve good accessibility. Reliability measurement effect, overcoming monotonicity defect, extending the scope of application

Inactive Publication Date: 2018-01-19
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Most of the existing models have the following three deficiencies: first, the model has strict restrictions on the actual information flow transmission; second, there is a "monotony defect" and the application range is small; third, it cannot be applied to cross-domain information flow transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multilevel security access control model based on information flow
  • Multilevel security access control model based on information flow
  • Multilevel security access control model based on information flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] The embodiment of the present invention introduces the specific realization of the multi-level security access control model based on information flow, and its realization architecture is as follows image 3 shown, including:

[0058] This embodiment is carried out on the hardware trusted platform based on the Godson 3A2000 processor, the software environment is the Ubuntu Core 16.0.2 LTS streamlined operating system integrated with the virtual trusted platform module, and the trusted computing environment before the system starts is constructed, and the After startup, static trustworthiness measurement is performed for the first time to ensure the trustworthiness of the environment before the system runs. An embodiment selects a trusted entity A in the initial trusted environment, trusted entities B and C from the same trusted domain of the trusted entity A, and an untrusted entity D from the trusted domain. Among them, the mandatory security access control rules are ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multilevel security (MLS) access control model based on information flow on the basis of the information flow forced access strategy. By analyzing relations and emphases on two multilevel security strategy BIBA and BLP models, the multilevel security though design information flow access rules are utilized, monotonic defects of existing models are considered, a trusted agent (TA) module for implementing access rules for specific information is designed, the limiting condition for information flow transmission is expanded, and meanwhile the system can still keep the original credible grade. The model has the good information flow access control effect and is applicable to cross-domain system information flow transmission.

Description

technical field [0001] The invention discloses a multi-level security access control model based on information flow, specifically relates to the design of information flow access rules using the idea of ​​multi-level security, combined with the "monotonic defect" of the existing model, designed a specific information flow access rule The trusted agent (Trusted Agent, TA) module, which dynamically measures information flow access entities, enables the system to maintain the original level of trustworthiness, and belongs to the field of information flow security and trustworthiness measurement in the computer field. Background technique [0002] Multilevel Security (MLS) refers to dividing all information in the same system into different security levels, so that information of different security levels can be completely isolated from each other, and entities of each security level can only access information of the corresponding level . An important field of multi-level sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 迮恺陈丹庄毅
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products