Computer Science ›› 2013, Vol. 40 ›› Issue (8): 124-128.

Previous Articles     Next Articles

Method of Binding Secure Label to Data Object Based on XML

CAO Li-feng,LI Zhong,CHEN Xing-yuan and FENG Yu   

  • Online:2018-11-16 Published:2018-11-16

Abstract: How to bind secure label to data object is a key problem in multi-level network that restricts MLS from practicality on network.This paper analyzed deeply xml,and expounded secure label of object based on xml and its restrictions,then put forward a method of binding secure label to data object based on XML.At the same time,some operations were discussed in detail,such as query of secure label,decomposition of object.Finally,secure communication based on secure label was described in multi-level network.The method can not only meet the need of secure communication in multi-level network,but also accomplish fine-grained mandatory access control,which may improve availability of information and reduce complexity of binding.

Key words: MLS,Classified security protection,XML,Secure label,Data object

[1] GB/T 22239-2008.信息安全技术信息系统安全等级保护基本要求[S].中国国家标准化管理委员会,2008
[2] Bell P D E,Padula L J L.Secure computer system:unified exposition and multics interpretation[R].ESD-TR-75-306.MTR 2997Rev.1,The MITRE Corporation,1976
[3] 季庆光,卿斯汉,等.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557
[4] 何建波,卿斯汉,等.对两个改进的BLP模型分析[J].软件学报,2007,18(6):1501-1509
[5] Peng P C,Rohatgi P,Keser C.Fuzzy multi-level security:an experiment on quantified risk-adaptive access control[C]∥IEEE Symposium on Security and Privacy.Oakland,CA,May 2007:222-230
[6] Magnani M,Montesi D.A Unified Approach to Structured,Se-mistructured and Unstructured Data[R].UBLCS- 2004-9.University of Bologna,2004
[7] Lee T Y.Formalisms on Semi-structured and Unstructured Data Schema Computations [D].University of Hong Kong,Hong Kong Special Administrative Region,2010
[8] 李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537
[9] Oudkerk S.A Proposal for an XML Confidentiality Label and Related Binding of Metadata to Data Objects[R].RTO-MP-IST-091-22.NATO C3Agency.2010
[10] Blazic A J,Saljic S.Confidentiality Labeling Using StructuredData Types[C]∥2010Fourth International Conferences on Di-gital Society.ST,Maarten,Feb.2010:182-187
[11] Pernul G,Winiwarter W,Tjoa A M.The entity-relationshipmodel for multilevel security[C]∥Proceedings of the 12th international conference on the entity-relationship approach:entity- relationship approach.Arlington,Texas,USA,December 1994:166-177

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!