Analysis and Improvement of BLP Model for Multi-Level Security Database

Article Preview

Abstract:

In the current multi-level security database system, the BLP model is the most widely used security model. For the problem of data redundancy, primary key loophole and reasoning channel of the BLP model, an improved method is proposed. The proposed method consummates the read-write level and the read-write range of user, increases the audit mechanism, eliminates the primary key loophole and avoids the reasoning channel to some extent. The proposed method in this paper improves the security of the BLP model and makes the security model more practical.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2536-2539

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Tanliang Zhou. Journal of Electronic Science and Technology of China. (2006).

Google Scholar

[2] Lin A, Brown R. Computer Communications . (2000).

Google Scholar

[3] Robinson J C, Alves-Foss J. A high assurance MLS file server. ACMSIGOPS Operating System Review. (2007).

DOI: 10.1145/1228291.1228303

Google Scholar

[4] NIST. Minimum Security Requirements for Federal Information and Information Systems. (2006).

Google Scholar

[5] LIU Y H, CHEN X S. A New Information Security Model based on BLP Model and BibaModel. Proceedings of7th International Conference on Signal Processing . (2004).

Google Scholar

[6] Alexandr S Basan, Lyudmila K. Babenko, Oleg B. Makarevich. A Model of Mandatory Access for Current Database Management Systems. Proceedings of the 2nd international conference on Security of information and networks . (2009).

DOI: 10.1145/1626195.1626213

Google Scholar