首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于TCB子集的访问控制信息安全传递模型
引用本文:唐乾,杨飞,黄琪,林果园.基于TCB子集的访问控制信息安全传递模型[J].山东大学学报(理学版),2016,51(7):98-106.
作者姓名:唐乾  杨飞  黄琪  林果园
作者单位:1. 中国矿业大学计算机科学与技术学院, 江苏 徐州 221116;2.北京中电普华信息技术有限公司, 北京 100192;3. 南京大学软件新技术国家重点实验室, 江苏 南京 210093
基金项目:国家青年科学自然基金资助项目(61303263);江苏省基础研究计划(自然科学基金)项目(BK20150201)
摘    要:综合考虑应用层向内核层传递访问控制信息的安全需求,提出了一种基于TCB子集的访问控制信息安全传递模型。应用层安全管理器与内核层安全管理器通过安全通路相联,安全通路为已加密状态,密钥存放在可信平台模块TPM(trusted platform model)中,访问控制信息进入安全通路前必须通过TPM的控制处理;安全通路解密后应用层安全通路接口把访问控制信息和校验标签传到内核层安全通路接口,随后应用层接口进行随机抽查,内核层接口返回验证证据并由应用层接口判断数据真实性和有效性。安全传递模型不仅可以有效地保证访问控制信息的安全性,还可以抵抗恶意欺骗和恶意攻击从而提高了访问控制的可靠性与有效性。

关 键 词:安全通路  访问控制信息  有效性  安全性  TCB子集  
收稿时间:2015-11-27

Security transfer model of access control information based on TCB subsets
TANG Qian,YANG Fei,HUANG Qi,LIN Guo-yuan.Security transfer model of access control information based on TCB subsets[J].Journal of Shandong University,2016,51(7):98-106.
Authors:TANG Qian  YANG Fei  HUANG Qi  LIN Guo-yuan
Institution:1. School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, Jiangsu, China;2. Beijing China-Power Information Technology Co., Ltd., Beijing 100192, China;3. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, Jiangsu, China
Abstract:A security transfer model of access control information based on TCB subsets was proposed by taking a comprehensive consideration of the security requirements for the application layer transferring the access control information to the kernel layer. One security manager in the application layer and the other security manager in the kernel layer are connected by security channel, which has been encrypted. The key is stored in the trusted platform module. The access control information must be managed by the trusted platform module before passing through the security channel. The application layer interface of the security channel transfers the access control information and the labels to the kernel layer interface of the security channel and then does random check, after the security channel has been encrypted. The kernel layer interface returns the proofs and the application layer interface judges the result. The security transfer model can not only ensure the security of the access control information, but also resist the spiteful cheat and the hostile attack, thus improving the reliability and valid of the access control.
Keywords:security channel  security  TCB subset  access control information  valid  
本文献已被 CNKI 等数据库收录!
点击此处可从《山东大学学报(理学版)》浏览原始摘要信息
点击此处可从《山东大学学报(理学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号