期刊文献+

基于Petri网的保密性策略建模与验证

Petri net-based modeling and verification of confidentiality policy
下载PDF
导出
摘要 为了对实施了具体保密性策略的系统、进程或工作流的保密性进行严格有效的分析与验证,提出了一种基于Petri网的保密性策略建模与验证方法.首先给出保密性策略基于Petri网的形式化描述,为系统建立Petri网模型;然后在此模型下利用保密性策略基于Petri网的形式化描述以及覆盖图对系统的保密性进行分析与验证,以判断系统是否符合保密性策略的要求.由于给定的系统Petri网模型覆盖图可以自动生成,因此可以利用其对系统的保密性进行自动分析与验证.通过一个进程实例阐述了该方法的原理和实施过程. For analyzing and verifying the confidentiality of system,process or workflow implemented a specific confidentiality policy,this paper proposed a Petri net-based approach to model and verify the confidentiality policy.Confidentiality policy was formally described via Petri net.In Petri net model of system,formal description of confidentiality policy and coverability graph were used to determine whether the system model is match the requirement of the policy.For a given Petri net model of system,the coverability graph could be automatically generated,thus it could be utilized to automatically analyze and verify the confidentiality of system.The theoretical feature and the implementation of the approach are addressed through a sample process.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第10期28-31,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60403027)
关键词 保密性策略 PETRI网 模型 验证 confidentiality policy Petri net model verification
  • 相关文献

参考文献10

  • 1Dong Xin,Chen Gang,Yin Jianwei,et al.Petri-net-based context-related access control in workflow environment[C]//Proceedings of the 7th International Conference on Computer Supported Cooperative Work in Design.New York:IEEE Press,2002:381-384.
  • 2Knorr K.Dynamic access control through petri net workflows[C] // Proceedings of the 16th Annual Computer Security Applications Conference.New Orleans:IEEE CS Press,2000:159-167.
  • 3Knorr K.Multilevel security and information flow in petri net workflows[J].Journal of Computer Security,2001,9(2,3):130-140.
  • 4陈卓,骆婷,石磊,洪帆.Perti Net-Based Workflow Access Control Model[J].Journal of Shanghai University(English Edition),2004,8(1):63-69. 被引量:2
  • 5朱国华,卢正鼎,洪帆.BLP模型主体敏感标记动态调整方案及其正确性证明[J].小型微型计算机系统,2003,24(11):2012-2015. 被引量:6
  • 6Bell D,Lapadula L.The Bell-Lapadula model[J].Journal of Computer Security,1996,4 (2,3):239-263.
  • 7洪帆,李静.多级安全工作流授权模型[J].华中科技大学学报(自然科学版),2002,30(1):20-22. 被引量:4
  • 8Murata T.Petri nets:properties,analysis and applications[J].Proceedings of the IEEE,1989,77(4):541-580.
  • 9Girault C,Valk R.Petri nets for system engineering:a guide to modeling,verification and application[M].Berlin:Springer-Verlag,2003.
  • 10Pauline N,Kawamoto,Yasushi Fuwa,Yatsuka Nakamura.Basic Petri net concepts[J].Formalized Mathematics,1992,3(2):183-187.

二级参考文献5

  • 1D E Bell. L J La Padula, Secure computer system: Unified exposition and multics interpretation[R], The MITRE Corporation, TechRep: MTR-2997 Revision1,1976.
  • 2V D Gligor, E L Burch, C S ChanderSekaran et al. On the design and the implementation of Secure xenix work stations [C]. In: Proc of the 1986 IEEE Symposium On Security and Privacy. Oakland. California: IEEE Computer society PreSS. 1986. 102-117.
  • 3Shengli Wu,Amit Sheth,John Miller,Zongwei Luo.Authorization and Access Control of Application Data in Workflow Systems[J].Journal of Intelligent Information Systems.2002(1)
  • 4Nabil R. Adam,Vijayalakshmi Atluri,Wei-Kuang Huang.Modeling and Analysis of Workflows Using Petri Nets[J].Journal of Intelligent Information Systems.1998(2)
  • 5石文昌,孙玉芳,梁洪亮.经典BLP安全公理的一种适应性标记实施方法及其正确性[J].计算机研究与发展,2001,38(11):1366-1372. 被引量:28

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部