Research on Information Security Model

Article Preview

Abstract:

Security of computer information system more and more aroused people’s attention, and information security assessment and computer system security model is closely related to information security model which is patricularly important. This article describes the security model of the characteristics and uses, and several security models are compared, these models were from a different perspective considering system security, through comparison Analysis, Establishment of information security model obtained several important aspects to consider.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 488-489)

Pages:

1684-1688

Citation:

Online since:

March 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Fuggetta A, Picco G P, Vigna G. Understanding code mobility. IEEE Transactions on Software Engineering,1998, 24(5):342~361.

DOI: 10.1109/32.685258

Google Scholar

[2] Karjoth G, Lange D B, Oshima M. A security model for Aglets. IEEE Internet Computing ,1997,1(4):68~77.

DOI: 10.1109/4236.612220

Google Scholar

[3] Giusppe A, Michael S, Gene T. New multiparty authentication services and key agreement protocols. IEEE Journal on Selectd Areas in Communications,2000,18(4):628~640.

DOI: 10.1109/49.839937

Google Scholar

[4] Denning D E. A lattice model of secure information flows[J]. Comm ACM,1976,19(5):236-243.

Google Scholar

[5] BEVIER W R,YOUNG W D. A State-based approach to noniterference[A].Proceedings of the Computer Security Foundation Wordshop VII[C].Franconia: New Hampshire,1994.11-21.

Google Scholar

[6] BIBA K J. Integrity consideration for secure computer system[R].Bedford Mass: Mitre Corp, 1977.MTR-2997.

Google Scholar