Research on Distributed Resource Security Monitor System Model

Yi Zhuang,Longping Pan,Kun Liu
DOI: https://doi.org/10.16356/j.1005-2615.2006.01.017
2006-01-01
Abstract:To improve the security of the distributed resource a MAC model is studied. By analyzing the Bell-Lapadula model based on the information security and Biba model based on the information integrality, the distributed resource security monitoring system (DRSMS) model and the system structure of distributed resource security monitor system are proposed. The algorithm for modifying the distributed security label base is proposed. The design and key realization technique of the document resource security monitor system are introduced. The security monitor prototyping system based on DRSMS model is implemented. Experiments show that DRSMS model can find and interdict invasion attempt from illegal document operation in time and the security monitor system can protect both confidentiality and integrality of the distributed resource.
What problem does this paper attempt to address?