版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、公司分部開關(guān)電源使用的OutlineWhat is an MLS/DBMS?Summary of DevelopmentsChallengesMLS/DBMS Designs and PrototypesData Models and FunctionsDirections公司分部開關(guān)電源使用的What is an MLS/DBMS?Users are cleared at different security levelsData in the database is assigned different sensitivity levels-multilevel databaseUsers
2、 share the multilevel databaseMLS/DBMS is the software that ensures that users only obtain information at or below their levelIn general, a user reads at or below his level and writes at his level公司分部開關(guān)電源使用的Why MLS/DBMS?Operating systems control access to files; coarser grain of granularityDatabase
3、stores relationships between dataContent, Context, and Dynamic access controlTraditional operating systems access control to files is not sufficientNeed multilevel access control for DBMSs公司分部開關(guān)電源使用的Summary of DevelopmentsEarly Efforts 1975 1982; example: Hinke-Shafer approach Air Force Summer Study
4、, 1982Research Prototypes (Integrity Lock, SeaView, LDV, etc.); 1984 - PresentTrusted Database Interpretation; published 1991Commercial Products; 1988 - Present公司分部開關(guān)電源使用的Air Force Summer StudyAir Force convened a summer study to investigate MLS/DBMS designsThen study was divided into three groups f
5、ocusing on different aspectsGroup 1 investigated the Integrity Lock approach; Trusted subject approach and Distributed approachGroup 2 investigated security for military messaging systemsGroup 3 focused on longer-term issues such as inference and aggregation公司分部開關(guān)電源使用的Outcome of the Air Force Summer
6、 StudyReport published in 1983MITRE designed and developed systems based on Integrity Lock and Trust subject architectures 1984 - 1986Rome Air Development Center (RADC, now Air Force Research Lab) funded efforts to examine long-term approaches; example: SeaView and LDV both intended to be A1 systems
7、RADC also funded efforts to examine the distributed approachSeveral prototypes and products followed公司分部開關(guān)電源使用的TDITrusted Database Interpretation is the Interpretation of the Trusted Computer Systems Evaluation criteria to evaluate commercial productsClasses C1, C2, B1, B2, B3, A1 and BeyondTCB (Tru
8、sted Computing Base Subsetting) for MAC, DAC, etc. (mandatory access control, discretionary access control)Companion documents for Inference and Aggregation, Auditing, etc. 公司分部開關(guān)電源使用的Taxonomy for MLS/DBMSsIntegrity Lock Architecture: Trusted Filter; Untrusted Back-end, Untrusted Front-end. Checksum
9、 is computed by the filter based on data content and security level. Checksum recomputed when data is retrieved. Operating Systems Providing Access Control/ Single Kernel: Multilevel data is partitioned into single level files. Operating system controls access to the filedExtended Kernel: Kernel ext
10、ensions for functions such as inference and aggregation and constraint processingTrusted Subject: DBMS provides access control to its own data such as relations, tuples and attributesDistributed: Data is partitioned according to security levels; In the partitioned approach, data is not replicated an
11、d there is one DBMS per level. In the replicated approach lower level data is replicated at the higher level databases公司分部開關(guān)電源使用的Integrity Lock公司分部開關(guān)電源使用的Operating System Providing Mandatory Access Control公司分部開關(guān)電源使用的Extended Kernel公司分部開關(guān)電源使用的Trusted Subject公司分部開關(guān)電源使用的Distributed Approach - I公司分部開關(guān)電源
12、使用的Distributed Approach II公司分部開關(guān)電源使用的Overview of MLS/DBMS DesignsHinke-Schaefer (SDC Corporation) Introduced operating system providing mandatory access controlIntegrity Lock Prototypes: Two Prototypes developed at MITRE using Ingres and Mistress relational database systemsSeaView: Funded by Rome Ai
13、r Development Center (RADC) (now Air Force Rome Laboratory) and used operating system providing mandatory access control and introduced polyinstationLock Data Views (LDV) : Extended kernel approach developed by Honeywell and funded by RADC and investigated inference and aggregation公司分部開關(guān)電源使用的Overvie
14、w of MLS/DBMS Designs (Concluded)ASD, ASD-Views: Developed by TRW based on the Trusted subject approach. ASD Views provided access control on viewsSDDBMS: Effort by Unisys funded by RADC and investigated the distributed approachSINTRA: Developed by Naval Research Laboratory based on the replicated d
15、istributed approachSWORD: Designed at the Defense Research Agency in the UK and there goal was not to have polyinstantiation公司分部開關(guān)電源使用的Some MLS/DBMS Commercial Products Developed (late 1980s, early 1990s)Oracle (Trusted ORACLE7 and beyond): Hinke-Schafer and Trusted Subject based architecturesSybase
16、 (Secure SQL Server): Trusted subjectARC Professional Services Group (TRUDATA/SQLSentry): Integrity LockInformix (Informix-On-LineSecure): Trusted SubjectDigital Equipment Corporation (SERdb) (this group is now part of Oracle Corp): Trusted SubjectInfoSystems Technology Inc. (Trusted RUBIX): Trusted
17、 SubjectTeradata (DBC/1012): Secure Database MachineIngres (Ingres Intelligent Database): Trusted Subject公司分部開關(guān)電源使用的Some Challenges: Inference ProblemInference is the process of forming conclusions from premisesIf the conclusions are unauthorized, it becomes a problemInference problem in a multileve
18、l environmentAggregation problem is a special case of the inference problem - collections of data elements is Secret but the individual elements are UnclassifiedAssociation problem: attributes A and B taken together is Secret - individually they are Unclassified公司分部開關(guān)電源使用的Some Challenges: Polyinstan
19、tiationMechanism to avoid certain signaling channelsAlso supports cover storiesExample: John and James have different salaries at different levels公司分部開關(guān)電源使用的Some Challenges: Covert ChannelDatabase transactions manipulate data locks and covertly pass informationTwo transactions T1 and T2; T1 operates at Secret level and T2 operates at Unclassified levelRelation R is classified at Unclassified levelT1 obtains read lock on R and T2 obtains write lock on R T1 and T2 can manipulate when they request locks and signal one bit information for e
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 生物標志物在糖尿病衰弱早期篩查中的應(yīng)用
- 生物墨水的細胞外基質(zhì)模擬設(shè)計
- 生物打印技術(shù)在骨盆缺損修復(fù)中的臨床應(yīng)用
- 生活質(zhì)量評估指導(dǎo)下的宮頸癌個體化放化療方案
- 滴工程師面試常見問題及答案
- 地勤指揮員面試題集
- 電子商務(wù)平臺運營經(jīng)理招聘面試題集
- 項目經(jīng)理專業(yè)面試題集與解答技巧
- 高級財務(wù)管理師面試題及解答指南
- 玫瑰痤瘡術(shù)后皮膚抗炎方案設(shè)計
- 護士長團隊建設(shè)管理心得體會
- 客服業(yè)務(wù)外包服務(wù)方案投標文件(技術(shù)方案)
- 房屋中介述職報告
- DB15T 435-2020 公路風吹雪雪害防治技術(shù)規(guī)程
- 備考2024四川省家庭教育指導(dǎo)師試題及答案三
- (正式版)CB∕T 4550-2024 船舶行業(yè)企業(yè)安全設(shè)備設(shè)施管理規(guī)定
- 全套管全回轉(zhuǎn)鉆機鉆孔咬合樁施工工藝
- 2024年春季學期中國文學基礎(chǔ)#期末綜合試卷-國開(XJ)-參考資料
- 軍隊物資工程服務(wù)采購產(chǎn)品分類目錄
- 《天文教學設(shè)計》教學設(shè)計
- 大學通用俄語1
評論
0/150
提交評論