期刊文献+

一个完整的无干扰模型 被引量:3

A COMPLETE NONINTERFERENCE MODEL
下载PDF
导出
摘要 本文提出了基于主体行为和视图的新无干扰概念,描述了一个完整的、基于新概念的信息流安全模型.在模型中把计算机系统中的操作抽象为读和写两种访问模式并定义了相应的转换规则.该模型主要特点有:用于分析系统的安全性;支持多安全策略. A new concept of noninterference based on subject's actions and views is presented in this paper, and then a complete secure information flow model based on the new concept is described. In the model, operations of computer systems are assumed to have only two access modes, i. e. read and write, therefore two state transition rules of systems are defined according to these modes. The proof about security of the model is given finally. This model has two significant features: it can be used to analyze security of systems, and it is able to support multiple security policies.
出处 《计算机学报》 EI CSCD 北大核心 1997年第11期1034-1037,共4页 Chinese Journal of Computers
基金 国家自然科学基金
关键词 安全模型 安全策略 计算机安全 无干扰模型 Security model, noninterference, security policy.
  • 相关文献

参考文献2

  • 1余祥宣,计算机研究与发展,1995年,32卷,10期,38页
  • 2马建平,硕士学位论文,1994年

同被引文献24

  • 1傅音翔,王直杰,张珏.一种基于构件的软件开发方法[J].微计算机信息,2006(01X):228-230. 被引量:30
  • 2谢钧,黄皓.一个非确定系统的不干扰模型[J].软件学报,2006,17(7):1601-1608. 被引量:5
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4Chen Youlei.Study on trusted computing model and architecture[D].Wuhan:Wuhan University,2006.
  • 5Goguen J,Mesegue J.Security policies and security mod-els//Proceedings of the 1982 Symposium on Security and Privacy.Los Alamitos,1982:11-20.
  • 6Haigh J,Young W.Extending the non-interference model of MLS for SAT//Proceedings of the 1986 Symposium on Security and Privacy.Oakland,CA,1986:232-239.
  • 7Rushby J.Noninterference,transitivity,and channel-control security policies.Stanford Research Institute,Menlo Park:Technical Report CSL-92-02,1992.
  • 8Ryan P Y A,Schneider S A.Process algebra and non-interference.Journal of Computer Security,2001,9(1/2).75-103.
  • 9Roscoe A W,Woodcock J C P,Wulf L.Non-interference through determinism//Proceedings of the European Symposium on Research in Computer Security (ESORICS).LNCS 875,1994:33-54.
  • 10Graham C J.Some laws of non-interference//Proceedings of the Computer Security Foundations Workshop.Franconia,USA,1992:22-33.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部