• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Li, Yong (Li, Yong.) | Zhang, Xing (Zhang, Xing.)

收录:

EI Scopus

摘要:

The traditional TCB is considered of working on system layer, while TCB in modern imformation system has extended to application layer. As keeping TCB trusted is one of the preconditions of ensuring information system security, it is necessary to study the trust attributes of extended TCB. In this paper, TCB is compartmentalized into TCB subsets according to the hierarchical structure of policy. Time-isolation relation and space-isolation relation are used to discrib the relations among TCB subsets. Based on the trusted-supporting relations, a theorem is brought forward and proved which gives the conditions to ensure the extended TCB trusted. At the end of this paper, an exemple is given to illuminate that access control mechanisms based on this model can provide more nice-granular control to enhance the security of system. © 2010 IEEE.

关键词:

Set theory Access control

作者机构:

  • [ 1 ] [Li, Yong]Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou, Henan 450004, China
  • [ 2 ] [Zhang, Xing]Institute of Computer, Beijing University of Technology, Beijing 100000, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

来源 :

年份: 2010

卷: 6

页码: 2838-2842

语种: 英文

被引次数:

WoS核心集被引频次:

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 0

归属院系:

在线人数/总访问数:147/4526370
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司