| 1. | Construction of loading jetty at blp 码头建造中 |
| 2. | Blp bar line printer 杆式宽行打印机 |
| 3. | Particularly , the multi - layer storage structure of the object data structure makes the blp model impractical 尤其是对象数据类型多层次的存储结构使得blp模型难以得到实际应用。 |
| 4. | In this dissertation the integrated and privilege - role extended unix operating system security model , which is based on the blp model , is discussed 在对blp模型进行分析的基础上,提出了以blp模型为基础的完整性和特权角色扩展的unix操作系统安全模型。 |
| 5. | Based on the examination of the bell and lapudula ( blp ) model , the limitation of the model is indicated , and the model is expanded . a general theorem of systcm security has been put forward 在考察blp模型的基础上,指出它的局限性,并对blp模型加以推广,给出系统的一般安全定理。 |
| 6. | In the implementation of the blp model , the authority of the credible subject must be controlled . we extended the concepts of the privilege and the role as the second improving to the blp . the rule of the least privilege is applied 在blp模型的具体实现中,还必须控制可信主体的权限,为此,我们提出的对blp模型另一改进方法是特权和角色扩展,增加特权和角色的概念,实施最小特权原则。 |
| 7. | Several mechanisms are provided to assure the system security based on the ultrakernel . separation , multilevel , hardware based access control and code error tolerance mechanisms are well integrated . ( 3 ) a developing platform and a firewall system prototype 整体采用可生存设计;在系统设计时加入了抗缓冲区溢出攻击机制和对抗dos攻击机制;设计了一种容忍代码错误的机制,另外还采用隔离与分级机制,并对blp模型进行改进应用。 |
| 8. | Therefore the improving method of the integrity in blp model is brought forward in this dissertation . the title of the integrity level should be added to both the subject and the object . while the security level of the object reigns the level of the subject , this means the low s ecrecy process wants to write the high secrecy data up , the integrity level of the subject and the object should be judged additionally 为此,我们提出blp安全模型的完整性改进方法,为主体和客体增加完整性级别标识,当客体的安全级严格支配主体的安全级时,即低保密性进程要进行向上写高保密性数据时,要增加判别主体和客体的完整性级别,此时,主体完整性级别必须支配客体的完整性级别。 |
| 9. | Then , the paper summaries disadvantages of traditional concurrency controls under multilevel security condition and introduces multilevel security dbms concurrency control . after summarizing the related research work , we present a multi level transaction model to solve the convert channel and starvation problems in concurrent control under blp multi level security model 本文首先分析了传统的数据库并发控制各自存在的优缺点,总结了传统并发控制在多级安全条件下存在的问题,由此引出了多级安全数据库并发控制机制。在总结了已有的研究基础上,针对blp多级安全模型下并发控制产生隐通道和饥饿问题,本文提出了一种多级事务模型- - - nhstm模型。 |
| 10. | In the beginning of the thesis , we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control . then we indicate the deficiency of the comparison of the security label in the practical application , and give the improved rules of security label comparison 本文首先介绍了开发b1级安全数据库的安全模型及其关键技术,着重描述了自主和强制访问控制的模型,然后指出blp模型安全级的比较在实际应用中的不足,给出改进的安全级比较规则。 |