期刊文献+

一个非确定系统的不干扰模型 被引量:5

A Noninterference Model for Nondeterministic Systems
下载PDF
导出
摘要 提出系统动作对信息域的不干扰概念,并在此基础上将不干扰模型推广到非确定系统.由于基于系统动作的不干扰概念简化了系统动作序列的提取操作,该模型的单步展开条件具有简洁的形式并易于理解和使用.推广后的不干扰模型不仅能够验证静态信息流策略,还可以验证各种动态信息流策略.最后设计了一个基于动态标记的访问控制模型,并在该模型中定义了读、写、执行等操作的具体语义,然后利用不干扰模型对其安全性进行了形式化验证. The noninterference concept for actions of system to information domains is proposed. On the basis of this concept, the noninterference model is extended to nondeterministic systems. The noninterference concept based on actions of system simplifies the "purge" of the action sequence of the system. As a result, this model has concise unwinding conditions which are easy to understand and use. The extended model can be used to verify not only static but also dynamic information flow policies. Finally, a dynamic label based access control model is designed, in which the concrete semantic of the actions such as read, write and execute are defined, and its security is verified by the noninterference model.
作者 谢钧 黄皓
出处 《软件学报》 EI CSCD 北大核心 2006年第7期1601-1608,共8页 Journal of Software
基金 国家自然科学基金~~
关键词 不干扰模型借息安全 安全模型 访问控制模型 信息流 noninterference model information security security model access control model information flow
  • 相关文献

参考文献11

  • 1Peri RV.Specification and verification of security policies[Ph.D.Thesis].Virginia:University of Virginia,1996.
  • 2Goguen J,Meseguer J.Security policies and security models.In:Proc.of the 1982 IEEE Symp.on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,1982.11-20.http://doi.ieeecomputersociety.org/10.1109/SP.1982.10014
  • 3Rushby J.Noninterference,transitivity,and channel-control security policies.Technical Report,CSL-92-02,Menlo Park:Stanford Research Institute,1992.
  • 4Zheng L,Myers AC.Dynamic security labels and noninterference.In:Dimitrakos T,Martinelli F,eds.Proc.of the 2nd Int'l Workshop on Formal Aspects in Security and Trust (FAST).Toulouse:Springer-Verlag,2004.27-40.
  • 5Sabelfeld A,Myers AC.Language-Based information-flow security.IEEE Journal on Selected Areas in Communications,2003,21(1):1-15.
  • 6Hicks M,Tse S,Hicks B,Zdancewic S.Dynamic updating of information-flow policies.In:Sabelfeld A,ed.Proc.of the Int'l Workshop on Foundations of Computer Security (FCS).Chicago,2005.7-18.http://www.cs.chalmers.se/~andrei/FCS05/fcs05.pdf
  • 7Ryan P,McLean J,Millen J,Gligor V.Non-Interference,who needs it? In:Proc.of the 14th IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,2001.237-241.http://csdl.computer.org/comp/proceedings/csfw/2001/1146/00/11460237.pdf
  • 8Mantel H.Unwinding possibilistic security properties.In:Cuppens F,Deswarte Y,Gollmann D,Waidner M,eds.Proc.of the 6th European Symp.on Research in Computer Security (ESORICS 2000).Toulouse:Springer-Verlag,2000.238-254.
  • 9McLean J.Security models.In:Marciniak JJ,ed.Encyclopedia of Software Engineering.New York:John Wiley & Sons,1994.http://www.cs.pomona.edu/classes/cs 190/Spapers/4-mclean94security.pdf
  • 10Zakinthinos A,Lee ES.A general theory of security properties.In:Proc.of the 1997 IEEE Symp.on Security and Privacy.Los Alamitos:IEEE Computer Society Press,1997.94-102.http://doi.ieeecomputersociety.org/10.1109/SECPRI.1997.601322

同被引文献33

  • 1李焕洲,林宏刚,张健,郭东军.可信计算中完整性度量模型研究[J].四川大学学报(工程科学版),2008,40(6):150-153. 被引量:10
  • 2谢钧,许峰,黄皓.基于可信级别的多级安全策略及其状态机模型[J].软件学报,2004,15(11):1700-1708. 被引量:19
  • 3卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 4张相锋,孙玉芳.Biba模型中严格完整性政策的动态实施[J].计算机研究与发展,2005,42(5):746-754. 被引量:15
  • 5Goguen J, Meseguer J. Security policies and security models[A] .Proceedings of the 1982 IEEE Symposium on Research in Security and Privacy[C]. Los Alamitos: IEEE Computer Society Press, 1982.11 - 20.
  • 6Rushby J. Noninterference, Transitivity, and Channel-Control Security Policies[R] .Menlo Park: Stanford Research Institute, 1992.
  • 7Heiko M. Unwinding possibilisfic security properties [ A ]. Proceedings of the 6th European Symposium on Research in Computer Security[C]. Toulouse: Springer-Vedag,2000.238 - 254.
  • 8Sabelfeld A, Myers A C. Language-based information-flow security[ J]. IEEE Journal on Selected Areas in Communications, 2003,21(1) : 1 - 15.
  • 9Bell D E, LaPadula L J. Secure Computer Ssytem: Unified Exposition and MULTICS Interpretation [ R ]. Bedford, MA: The MITRE Corporation, 1976.
  • 10Goguen J,Mesegue J.Security policies and security mod-els//Proceedings of the 1982 Symposium on Security and Privacy.Los Alamitos,1982:11-20.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部