期刊文献+

基于安全进程代数的信息流模型 被引量:1

Information Flow Models Based on Security Process Algebra
下载PDF
导出
摘要 文章在安全进程代数理论框架内讨论信息流安全模型。基于进程代数语义理论,研究了无干扰性质及不可演绎性质的构造、关系及可复合性。 A process algebraic approach to the modelling of information flow security is explained. In this paper, the derivation of process algebraic expressions for no-interference and non-deducibility property, and the composibility of those expressions are discussed.
出处 《信息工程大学学报》 2004年第3期5-9,共5页 Journal of Information Engineering University
基金 国家863计划信息安全技术主题"网络安全及防御技术"资助项目(863-104-06-1)
关键词 安全进程代数 信息流安全 无干扰 不可演绎 process algebra information flow security no-interference,non-deducibility
  • 相关文献

参考文献12

  • 1[1]Focardi R,Gorrieri R.A Classification of Security Properties for process algebras[J]. Journal of Computer Security 1994/1995,3(1):5 - 33.
  • 2[2]Focardi R, Gorrieri R.Classification of security properties (PartⅠ:Information Flow) [J]. In Foundations of Security Analysis and Design-Tutorial Lectures,LNCS,Springer-Verlag, 2001, 2171: 331 - 396.
  • 3[3]Goguen J A, Meseguer J. Security policies and security models[ A]. In Proceedings of the IEEE Symposium on Research in Security and Privacy[C], 1982, 11 -20.
  • 4[4]Goguen J, Meseguer J. Inference control and unwinding[A].In Proceedings of the IEEE Symposium on Research in Security and Privacy[C].1984,75 - 86.
  • 5[5]Milner R.Communication and Concurrency [M].PrenticeHall, 1989.
  • 6[6]Milner R. Communicating and Mobile Systems:the Pi-Calculus [M], Cambridge University Press, 1999.
  • 7[7]McCullough D. Specifications for multi-level security and a hook-up property[A]. Proceedings of the IEEE Symposium on Research in Security and Privacy[C].1987.161 - 166.
  • 8[8]Roscoe A W.The Theory and Practice of Concurrency [M].Prentice-Hall,1997.
  • 9[9]Ryan P Y A. Mathematical models of computer security[J].In Foundations of Security Analysis and Design-Tutorial Lectures ( R. Focardi and R. Gorrieri Eds), LNCS, SpringerVerlag, 2001, 2171: 1 - 62.
  • 10[10]Ryan P Y A , Schneider S A. Process algebra and non-interference [A]. In Proceedings of the Computer Security Foundations Workshop 12[C]. 1999,214 - 227.

二级参考文献5

  • 1[1]Foley S N. A universal theory of information flow[A].In Proceding of the IEEE Symposium on Research in Security and Privacy[C].IEEE Press,1987,116-121.
  • 2[2]Hoare, C A R. Communicating Sequential Processes[M]. Prentice Hall, 1985.
  • 3[3]Ryan P Y A. A CSP formulation of non-interference and unwinding[M].Presented at CSFW 1990 and published in Cipher,1991,19-30.
  • 4[4]Milner R. Communication and Concurrency[M].Prentice-Hall,1989.
  • 5[5]Focardi R,Gorrieri R. A Classification of Security Properties for process algebras[J].Journal of Computer Security,1994,3(1):5-33.

共引文献4

同被引文献14

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部