Research of Multilevel Security Network Based on Mobile IPv6

Article Preview

Abstract:

multilevel security technology has broad applications in military and commercial aspects, the key technology in the research of multilevel security network, based on the BLP model of a security enhancement model is presented, and proved its security of the model. Secondly, based on the analysis of RBAC96 model cluster, proposes a licensing scheme of multilevel mobile IPv6 network based on role. Again gives an implementation scheme of multilevel security network in mobileIPv6 network environment. Including the configuration and deployment of mobile IPv6 environment of multilevel security network, and gives the process of multilevel security network. Finally, the simulation results of multilevel security network is given. The results show that, the multilevel security network design to meet the functional requirements of multilevel security network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

6019-6022

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Kent, S. and R. Atkinson. Security Architecture for the Internet Protoc01. RFC 2401, November (1998).

Google Scholar

[2] Kent, S. and R. Atkinson, IP Authentication Header, RFC 2402, November (1998).

Google Scholar

[3] Di Vito L, Palmquist P H, Anderson E R, et a1. Sepcification and Verification of the ASOS Kernel[A]. Proceedings of the 1 990 IEEE Computer Society Symposium on Research in Security and Privacy[C]. Oakland: IEEE, 1990. 61-74.

DOI: 10.1109/risp.1990.63839

Google Scholar

[4] Ravi Sandhu, Edward J Coyne, Hal L Feinstein, et a1. Role—Based Access Control Models, IEEE Computer, Feb 1996, 29(2): 38-47.

DOI: 10.1109/2.485845

Google Scholar

[5] Quan Yining, Hu Yupu. Operating system security access control model. Journal of Xi'an Electronic and Science University, v01. 33 No. 4, Aug. 2006: 539-542.

Google Scholar

[6] Osbom S, Sandhu R, Munawer Q. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM TISSEC, May 2000. 3(2): 85-106.

DOI: 10.1145/354876.354878

Google Scholar