A multi-level security model based on trusted computing

被引:0
|
作者
Jia, Zhao [1 ]
Liu Ji-qiang [1 ]
Jing, Chen [2 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
[2] CIeNET Technol Co Ltd, Beijing 100044, Peoples R China
关键词
multi-level security model; trusted computing; confidential level; integrity level; trusted subject; the least privilege;
D O I
10.1109/ISDPE.2007.71
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some secure models protect the confidentiality and some secure models protect the integrity. How to combine the two types secure models faultlessly is still a problem. At present, a serious of secure models protect both confidentiality and integrity are based on the privilege subject, but it does not satisfy the least privilege principle. In the paper a multi-level security model based on trusted computing is proposed, and it can limit the privilege of subjects efficiently.
引用
收藏
页码:448 / +
页数:2
相关论文
共 50 条
  • [41] Mobile Security and Trusted Computing
    Mitchell, Chris
    IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [43] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    中国通信, 2013, 10 (11) : 11 - 12
  • [44] Security analysis of personal computers based on trusted computing
    Liu Niansheng
    Li Yongmei
    Ding Yuechao
    Guo Donghui
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 565 - 568
  • [45] Trusted Computing: Security and Applications
    Gallery, Eimear
    Mitchell, Chris J.
    CRYPTOLOGIA, 2009, 33 (03) : 217 - 245
  • [46] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +
  • [47] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [48] Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing
    Xi, Wei
    Li, Xiaobo
    Feng, Qihui
    Yao, Hao
    Cai, Tiantian
    Yu, Yang
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [49] Dynamic Analysis of Enterprise Security System Based on Multi-level Analysis and Structural Equation Model
    Li, Ze-yu
    Chen, Xue-bo
    Sun, Qiubai
    ADVANCES IN SAFETY MANAGEMENT AND HUMAN FACTORS (AHFE 2018), 2019, 791 : 217 - 226
  • [50] A multi-level security model for partitioning workflows over federated clouds
    Watson, Paul
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1