期刊文献+

安全策略模型规范及其形式分析技术研究 被引量:2

Research on formal security policy model specification and its formal analysis
下载PDF
导出
摘要 形式化是开发高安全等级计算机系统的核心技术之一,但目前形式开发方法无法直接借助于机器证明获得较之手工证明更加严格的安全策略模型正确性保证,以及安全策略模型和安全功能规范之间的精确对应。通过把安全功能规范开发技术应用于安全策略模型的开发中,提出了一种新颖的安全策略模型形式规范构造方法及其证明机理,从而有效解决了上述问题。还以Bell-LaPadula多级安全策略为实例,具体说明了规范的形式开发和形式分析过程。 Formal method is one of the kernel technologies of developing high security level computer system. But by current formal development method, assurance of security policy model correctness cannot be provided directly using machine proof which is stricter than manual proof, correspondence between security policy model and security functional specification is also hard to achieve. To solve these problems, a new and effective method was proposed for specification constructing and proving by extending the specification technique of security functional specification into the specification of security policy model. Also, BLP model was specified and analyzed as an example.
出处 《通信学报》 EI CSCD 北大核心 2006年第6期94-101,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60573042) 国家重点基础研究发展计划("973"计划)基金资助项目(G1999035810) 北京市自然科学基金资助项目(4052016)~~
关键词 安全策略模型 形式规范 形式分析 定理证明 Bell-LaPadula模型 security policy model formal specification formal analysis theorem prove BeU-LaPadula model
  • 相关文献

参考文献19

  • 1International Standards Organization.Information Technology Security Techniques-Evaluation Criteria for IT Security[S].ISO/IEC 15408.1999
  • 2National Computer Security Center,DoD 5200.28-STD.Trusted Computer Systems Evaluation Criteria[S].Ft Meade,MD,1985.
  • 3ANDERSON J P.Computer Security Technology Planning Study[R].ESD-TR-73-51.Vol.1,US Air Force,1972.
  • 4PAYNE C.Secure policy model[A].Navy Handbook for the Computer Security Certification of Trusted Systems[C].Washington,1995.
  • 5NASA.Formal Methods Specification and Analysis Guidebook for the Verification of Software and Computer Systems[R].Volume Ⅰ:Planning and Technology Insertion,NASA/rP-98-208193,199g.
  • 6ZEIGLER B.Theory of Modeling and Simulation[M].Wiley,New York,NY,1976.
  • 7WOODCOCK J,DAVIES J.Using Z:Specification,Refinement and Proof[M].Prentice Hall,1996.
  • 8Secure Computing Corporation.DTOS Lessons Learned Report[R].CDRL Sequence No.A008,Secure Computing Corporation,Roseville,Minnesota,1997.
  • 9Secure Computing Corporation.Assurance in the Fluke Microkernel:Formal Security Policy Model[R].CDRL A003,Technical Report,Secure Computing Corporation,1999.
  • 10MCLEAN J.A comment on the basic security theorem of Bell and LaPadula[J].Information Processing Letters,1985,20(2):67-70.

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部