您要查找的是不是:
- In the article,Classical BLP Model was introduced to confine the flow of information in order to implement one scheme of AC. 文章从规范系统内的信息流向出发,引用经典的BLP安全模型,制订了1个小型系统的访问控制设计方案。
- In multilevel secure database systems, the "Write Up" protocol of classic BLP model violates integrity constraints and produces covert channel and polyinstance problem. 在多级安全数据库系统中经典的 BL P模型的“向上写”违反了数据库的完整性 ;并产生隐通道和带来多实例问题 .
- The Research and Application on Role-Based Classical BLP Model 基于角色的经典BLP模型的研究与应用分析
- An Improvement of the Subject's Sensitivity Label and the Dynamic Determination of the Current Sensitivity Label for the Classical BLP Model 一种改进的BLP模型主体敏感标记及其动态调整方案
- classical BLP model 经典BLP模型
- Finally,the adjusted BLP model on LSM is implemented(Linux security module). 最后给出了调整后的BLP模型在LSM(Linux security module)上的实现。
- Particularly, the multi-layer storage structure of the object data structure makes the BLP model impractical. 尤其是对象数据类型多层次的存储结构使得BLP模型难以得到实际应用。
- In this dissertation the integrated and privilege-role extended UNIX operating system security model, which is based on the BLP model, is discussed. 在对BLP模型进行分析的基础上,提出了以BLP模型为基础的完整性和特权角色扩展的UNIX操作系统安全模型。
- In makes an applied multi-level relation model to be basement of security database for following the BLP model. 为了适应BLP模型,采用一种实用的多级关系模型作为安全数据库的基础,这是原有关系模型的扩展。
- For arbitrary circumstances, the new security function corresponds to that in BLP model and Biba model. 对于任意情况;新函数与BLP模型和Biba模型的信息安全函数对应.
- It is proved that the extended BLP model can enhance both the confidentiality and usability of the database system. 经过证明;扩展后的BLP模型不仅增强了数据库系统的机密性而且增强了可用性.
- By using these methods,we develop the BLP Model into a new Multi-level Security Model with memory ability. 通过这些方法将BLP模型改造成为具有记忆能力的新型多级安全模型。
- By using these methods,we develop the BLP Model into a new Multi-level Security Mo... 通过这些方法将BLP模型改造成为具有记忆能力的新型多级安全模型。
- Using the operating action as object of control,the scheme pay much attention to the confidentiality of BLP Model,and also give consideration to the integrity. 方案以访问动作为控制对象,着重体现了BLP模型所要求的机密性,同时也对完整性有所考虑。
- However,the access rule of "Read Down" and "Write Up" of the BLP model seriously affects its usability and flexibility of the system. 但是BLP模型的“向下读”和“向上写”的存取规则严重影响了系统的可用性和灵活性.
- The extended BLP model not only has more system confidentiality but also has more availability and data integrity, comparing with the basic BLP Model. 通过修改安全约束的定义,使得安全约束之间始终是协调的,并给出一种高效的密级分配算法;
- This paper discusses the BLP security model, and analyzes the security of Linux System. At last it expounds the way of realizing the BLP model under Linux system. 先深入讨论了BLP安全模型 ,然后分析Linux系统的特点与存在的安全隐患 ,最后详细阐述了BLP模型在Linux系统的实现 ,提出了一种Linux环境下安全增强的方法。
- At last ,based on the BLP model, we introduce the Linux loadable kernel module,and how to use LKMs to implement the enhanced security Linux operating system. 接着在第六章通过BLP模型实体对Linux系统的映射,借助可卸载内核模块机制,基于内核系统调用函数的安全改进与增删,实现BLP模型存取控制机制在Linux系统上的应用。 最后对整个课题研究与开发进行了总结,并对Linux系统安全作了进一步的展望。
- BLP Model?s access rules of "No Read Up,No Write Down" seriously constrain the system?s availability and data integrity,it doesn?t have any mechanism to control inference. BLP模型也没有对推理进行任何控制。
- The theory and technique details about applying BLP model to enforce security on code open DBMS PostgrSQL and to develop a secure RDBMS prototype are illustrated in the paper. 文章讨论了应用BLP模型公开源码数据库PostgreSQL进行安全增强、实现安全数据库原型系统的原理与技术细节。
