biba model meaning in Chinese
模型
Examples
- Several approaches are provided to construct secure operating systems . the paper mainly discusses diverse security policies in operating systems . by the gfac framework , we implement several security policies in linux kernel version 2 . 2 . 14 , including hru model based fine grain discretionary access control , multi - level security policy based mandatory access control and biba model based integrity access control
文章重点研究了如何在操作系统中实现多种安全策略,并在linux内核版本2 . 2 . 14中根据访问控制通用框架( gfac )方法,实现了基于hru模型的细粒度自主访问控制、基于bell - lapadula模型多级安全规则的强制访问控制以及基于biba模型的强制访问控制等多种安全策略,从而有效地增强了操作系统中信息的保密性和完整性。