{"title":"拒绝服务的策略模型","authors":"E. Amoroso","doi":"10.1109/CSFW.1990.128191","DOIUrl":null,"url":null,"abstract":"A service model that is framed on the notions of subject priority and object criticality is introduced. The prevent (p, c) denial of service policy is expressed with respect to the service model. The author demonstrates an approach to arguing compliance with the policy by interpreting the System V/MLS secure operating system in terms of the service model, and then providing a sketch of an evaluation with respect to the prevent (2, 2) policy.<<ETX>>","PeriodicalId":185508,"journal":{"name":"[1990] Proceedings. The Computer Security Foundations Workshop III","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"A policy model for denial of service\",\"authors\":\"E. Amoroso\",\"doi\":\"10.1109/CSFW.1990.128191\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A service model that is framed on the notions of subject priority and object criticality is introduced. The prevent (p, c) denial of service policy is expressed with respect to the service model. The author demonstrates an approach to arguing compliance with the policy by interpreting the System V/MLS secure operating system in terms of the service model, and then providing a sketch of an evaluation with respect to the prevent (2, 2) policy.<<ETX>>\",\"PeriodicalId\":185508,\"journal\":{\"name\":\"[1990] Proceedings. The Computer Security Foundations Workshop III\",\"volume\":\"76 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1990] Proceedings. The Computer Security Foundations Workshop III\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSFW.1990.128191\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1990] Proceedings. The Computer Security Foundations Workshop III","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1990.128191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A service model that is framed on the notions of subject priority and object criticality is introduced. The prevent (p, c) denial of service policy is expressed with respect to the service model. The author demonstrates an approach to arguing compliance with the policy by interpreting the System V/MLS secure operating system in terms of the service model, and then providing a sketch of an evaluation with respect to the prevent (2, 2) policy.<>