期刊文献+

移动计算系统信息流安全 被引量:5

Information Flow Security for Mobile Computation System
下载PDF
导出
摘要 程序信息流安全是信息安全的一个重要研究方向.基于类型的静态分析可以保证程序信息流安全.与单进程系统相比,移动计算系统中数据通讯的存在使得程序信息流安全保护更加困难.Cornell大学的Zdancewic对函数式语言λsec的单进程程序信息流安全进行了研究.本文在其工作的基础上,根据移动计算系统的结构特征,通过对函数式语言λsec进行扩充,加入通讯原语,将其扩展成移动计算语言MobileML,并针对一个简单的移动计算模型,给出了描述程序信息流安全的无干扰性定义,设计了相应的信息流类型系统,用以静态检查保证MobileML语言程序信息流安全. Ensuring information flow security of programs is an important research direction of information security. Typebased analyses can be used to ensure information flow security of programs. Mobile computation system involves communication, which makes ensuring security more difficult. Based on the Zdancewic's work, this paper extends λsec with constructs for transmitting and receiving values on channels across remote sites, and develops a type system to ensure information flow security for simple mobile computation system.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第8期1455-1460,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60473068)资助
关键词 程序信息流安全 无干扰性 形式语义 类型系统 子定型 information flow security noninterference formal semantics type system subtyping
  • 相关文献

参考文献12

  • 1Sabelfeld A, Myers A C. Language-based information-flow security[J]. IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 2Myers A C. Jflow: Practical mostly-static information flow control[C]. Proceedings of the 26th ACM Symposium on POPL,1999:228-241.
  • 3Pottier F, Simonet V. Information flow inference for ML[J].ACM Transactions on Programming Languages and Systems,2003,25(1):117-158.
  • 4Goguen J A, Meseguer J. Security policies and security models[C]. Proceedings of IEEE Symposium on Security and Privacy,1982:11-20.
  • 5Zdancewic S. Programming Languages for Information Security [C]. Cornell University, 2002.
  • 6Dilsun Kirli. Mobile functions and secure information flow[C].Proceedings of the Workshop on Issues in the Theory of Security, Geneva, 2000.
  • 7Chen Yi-Yun. Theory of programming languages[M]. Beijin: Higher Education Press, 2004.
  • 8Pierce B C. Types and programming languages[M]. The MIT Press, 2002.
  • 9Volpano D, Geoffrey S, Irvine Cynthia. A sound type system for secure flow analysis [J]. Journal of Computer Security, 1996,4 (3): 167-187.
  • 10Heintze N, Riecke J G. The SLam calculus: programming with secrecy and integrity[C]. Proceedings of the 25th ACM Symposium on POPL, 1998:365-377.

同被引文献33

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部