期刊文献+

A formal model for integrity protection based on DTE technique 被引量:4

A formal model for integrity protection based on DTE technique
原文传递
导出
摘要 In order to provide integrity protection for the secure operating system to satisfy the structured protection class' requirements, a DTE technique based integrity protection formalization model is proposed after the implications and structures of the integrity policy have been analyzed in detail. This model consists of some basic rules for configuring DTE and a state transition model, which are used to instruct how the domains and types are set, and how security invariants obtained from initial configuration are maintained in the process of system transition respectively. In this model, ten invariants are introduced, especially, some new invariants dealing with information flow are proposed, and their relations with corresponding invariants described in literatures are also discussed. The thirteen transition rules with well-formed atomicity are presented in a well-operational manner. The basic security theorems correspond to these invariants and transition rules are proved. The rationalities for proposing the invariants are further annotated via analyzing the differences between this model and ones described in literatures. At last but not least, future works are prospected, especially, it is pointed out that it is possible to use this model to analyze SE-Linux security. In order to provide integrity protection for the secure operating system to satisfy the structured protection class' requirements, a DTE technique based integrity protection formalization model is proposed after the implications and structures of the integrity policy have been analyzed in detail. This model consists of some basic rules for configuring DTE and a state transition model, which are used to instruct how the domains and types are set, and how security invariants obtained from initial configuration are maintained in the process of system transition respectively. In this model, ten invariants are introduced, especially, some new invariants dealing with information flow are proposed, and their relations with corresponding invariants described in literatures are also discussed. The thirteen transition rules with well-formed atomicity are presented in a well-operational manner. The basic security theorems correspond to these invariants and transition rules are proved. The rationalities for proposing the invariants are further annotated via analyzing the differences between this model and ones described in literatures. At last but not least, future works are prospected, especially, it is pointed out that it is possible to use this model to analyze SE-Linux security.
出处 《Science in China(Series F)》 2006年第5期545-565,共21页 中国科学(F辑英文版)
基金 supported by the Beijing Natural Science Foundation(Grant No.4052016) the National Natural Science Foundation of China(Grant No.60573042) the National Grand Fundamental Research 973 Program of China(Grant No.G1999035802).
关键词 formal model integrity policy information flow DOMAIN type. formal model, integrity policy, information flow, domain, type.
  • 相关文献

参考文献27

  • 1[1]Jueneman R R.Integrity controls for military and commercial applications.In:Fourth Aerospace Computer Security Applications Conference.Florida:IEEE Computer Society Press,1988.298-322
  • 2[2]Ruthberg Z G,Polk W T Report of the Invitational Workshop on Data Integrity,National Institute of Standards and Techonology.NIST Special Publication,September,1989.500-168
  • 3[3]Mayfield T,Boore J M,Welke S R.Integrity-oriented control objectives:Proposed revision to the trusted computer systems evaluation criteria (TCSEC,DoD5200.28.STD),IDA document D-967,prepared for National Security Agency (US),available at http://www.mirrors.wiretapped.net/security/inf/reference/ncse-publications/C-TR-111-91.pdf
  • 4[4]Information technology-Security techniques-Evaluation criteria for IT security-Part 2:Security functional requirements,ISO/IEC 15408-2,1999,International Standards Organization
  • 5[5]Abrams M D,Joyce M V.Trusted system concepts.Computers and Security,1995,14(1):45-56
  • 6[6]Bell D E.Multipolicy machine Model.In:Proceedings of the 1994 ACM SIGSAC on New Security Paradigms Workshop.Little Compton,RI USA,August 1994,2-9
  • 7[7]Mayfield T,Roskos J E,Welke S R,et al.Integrity in automated information systems,NCSC Technical Report,National Computer Security Center,1991,91
  • 8[8]Sandhu R S.On five definitions of data integrity.In:Keefe T F,Landwehr C E,eds.Database Security,Ⅶ:Status and Prospects.Proceedings of the IFIP WG11.3 Workshop on Database Security,Lake Guntersville,Alabama,1993.257-267
  • 9[9]LaPadula L J.Rule-set modeling of a trusted computer system.In:Abrams M D,Jajodia S,Podell H J,eds.Information Security:An Integrated Collection of Essays.Los Alamitos:IEEE Computer Society Press,1995.187-226
  • 10[10]Kargar P A,Austel V,Toll D.A new mandatory security policy combining secrecy and integrity.IBM research report RC21717,2000

同被引文献18

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部