메뉴 건너뛰기




Volumn 29, Issue 10, 2008, Pages 37-44

Modified security model based on dynamic trusted degree

Author keywords

Dynamic modified; Security architecture; Security model; Trusted degree

Indexed keywords

DYNAMIC TRANSFORMATIONS; FORMAL DESCRIPTIONS; ON DYNAMICS; SAFETY ANALYSIS; SECURITY ARCHITECTURE; SECURITY MODEL; SECURITY MODELS; TRUSTED COMPUTING; TRUSTED DEGREE;

EID: 56549108252     PISSN: 1000436X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (14)
  • 4
    • 0024124274 scopus 로고
    • An interpretation of a refined bell-la padula model for the TMach kernel
    • Orlando, FL
    • Mayer L F. An interpretation of a refined bell-la padula model for the TMach kernel[A]. Proceedings of the 4th Aerospace Computer Security Conference[C]. Orlando, FL, 1988.368-378.
    • (1988) Proceedings of the 4th Aerospace Computer Security Conference , pp. 368-378
    • Mayer, L.F.1
  • 7
    • 34247398368 scopus 로고    scopus 로고
    • A multi-level security model with least privilege support for trusted subject
    • Wu Y J, Liang H L, Zhao C. A multi-level security model with least privilege support for trusted subject[J]. Journal of Software, 2007, 18(3):730-738.
    • (2007) Journal of Software , vol.18 , Issue.3 , pp. 730-738
    • Wu, Y.J.1    Liang, H.L.2    Zhao, C.3
  • 8
    • 10644278428 scopus 로고    scopus 로고
    • Research on and eEnforcement of methods of secure operating systems
    • Institute of Software, Chinese Academy of Sciences
    • Shi W C. Research on and Enforcement of Methods of Secure Operating Systems[D]. Institute of Software, Chinese Academy of Sciences, 2001.
    • (2001)
    • Shi, W.C.1
  • 9
    • 10644289533 scopus 로고    scopus 로고
    • An improved dynamically modified confidentiality policies model
    • Ji Q G, Qing S H, He Y P. An improved dynamically modified confidentiality policies model[J]. Journal of Software, 2004, 15(10): 1547-1557.
    • (2004) Journal of Software , vol.15 , Issue.10 , pp. 1547-1557
    • Ji, Q.G.1    Qing, S.H.2    He, Y.P.3
  • 10
    • 14844291531 scopus 로고    scopus 로고
    • Attestation-based policy enforcement for remote access
    • Washington, DC, USA
    • Sailer R, Jager T, Zhang X L. Attestation-based policy enforcement for remote access[A]. CCS'04[C]. Washington, DC, USA,2004. 308-317.
    • (2004) CCS'04 , pp. 308-317
    • Sailer, R.1    Jager, T.2    Zhang, X.L.3
  • 11
    • 33751096067 scopus 로고    scopus 로고
    • A trusted linux client
    • Safford D, Zohar M. A trusted linux client [EB/OL]. http://domino. research.ibm.com/comm/research_projects.nsf/pages/gsal.TGG. html. 2005.
    • (2005)
    • Safford, D.1    Zohar, M.2
  • 12
    • 30144435491 scopus 로고    scopus 로고
    • Peer-to-peer access control architecture using trusted computing technology
    • Stockholm, Sweden
    • Sandhu R, Zhang X. Peer-to-peer access control architecture using trusted computing technology[A].SACMAT'05[C]. Stockholm, Sweden, 2005. 147-158.
    • (2005) SACMAT'05 , pp. 147-158
    • Sandhu, R.1    Zhang, X.2
  • 13
    • 34648834826 scopus 로고    scopus 로고
    • Research on multilevel security model based on trustworthy state and its application
    • Zhang X F, Xu F, Shen C X. Research on multilevel security model based on trustworthy state and its application[J]. Acta Electronics Sinica, 2007, 35(8):1511-1515.
    • (2007) Acta Electronics Sinica , vol.35 , Issue.8 , pp. 1511-1515
    • Zhang, X.F.1    Xu, F.2    Shen, C.X.3
  • 14
    • 0013347631 scopus 로고    scopus 로고
    • Common vulnerabilities and exposures
    • Common vulnerabilities and exposures[EB/OL]. http://cve.mitre. org/.2007.
    • (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.