期刊文献+

信息流图的分割算法

Divide Algorithm Based on Information-flow Chart Build Forest
下载PDF
导出
摘要 一个多级安全系统的信息传递关系是搜索隐通道的重要依据。由于一个大型多安全级软件系统的信息传递关系非常复杂,对其直接进行信息流分析并搜索隐通道的工作量非常大,因此为进一步提高搜索和分析隐通道的效率,提出了一种将信息流图分割成信息流森林的算法。该算法首先选定一棵父树,然后通过边割集中的弧置换父树中的树枝得到新树,并能从理论上保证分割后得到的信息流森林正确继承原图的信息,即原图中信息流既未被割裂也未丢失。通过对每棵信息流树表示的信息流进行分析就可取代对整个信息流图的分析,从而有效降低了分析问题的规模。 Information-flows of mains and objects in a Multi-level security system could be used to describe an information-flow chart. This information-flow chart is the important basis of covert-channel search. But the information-flow charts in big system are intricately. Therefore, we proposed a new segmentation algorithm based on information-flow chart to build forest. Segmentation algorithm needs to ensure that information-flow forest could inherit correct information from information-flow chart. First, arbitrary full path in information-flow chart is not fragmented. Second, arbitrary full path in information-flow could not miss. Last, algorithm is able to handle the cycle flow of information. Analyzing the information flow, we can replace the entire information-flow chart. So it could effectively lower the analysis of the complexity of the problem. The new model could be used in the field of covert-channel search analysis, and improve the efficiency.
出处 《计算机科学》 CSCD 北大核心 2008年第10期126-130,共5页 Computer Science
基金 国家自然科学基金(60573046 60773049) 江苏省高校自然科学研究计划(07KJB520016) 江苏大学高级人才项目(07JDG053)的资助
关键词 信息流 隐通道 多级安全系统 information-flow,Covert channel,Multi-level security system
  • 相关文献

参考文献14

  • 1Denning D. A Lattice Model of Secure Information-flow[J]. Comm.of the ACM,1976,19(5):236-246
  • 2Kemrnerer R A. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer Systems[J]. 1983 : 256-277
  • 3Goguen J A, Meseguer J. Security policies and security models//Proc. of the IEEE Symp. on Security and Privacy. 1982:11-20
  • 4Tsai C R,Gligor V D. A formal method for the identification of covert storage channels in secure code. IEEE trans, on Software Engineering, 1990 : 569-580
  • 5鞠时光,宋香梅.用于信息流分析的信息流树结构[J].江苏大学学报(自然科学版),2005,26(5):433-436. 被引量:4
  • 6Eckmann S T. Eliminating Formal Flows in Automated Information flow Analysis. IEEE, 1994
  • 7郭殿春,鞠时光,余春堂,扬珍.隐通道及其搜索方法[J].计算机工程,2003,29(17):73-75. 被引量:2
  • 8郭殿春.隐通道搜索方法研究与实现[D].硕士毕业论文.2004
  • 9Goguen J A, Meseguer J. Unwinding and Inference Control// Proceedings of the IEEE Symposium on Security and Privacy. Oakland, California, April 1984 : 75-86
  • 10Haigh J T,Kemmerer R A,McHugh J,et al. An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Transactions on Software Engineering, February 1987,13(2) : 157-168

二级参考文献14

  • 1Mchugh J. Covert Channel Analysis: A Chapter of the Handbook For the Computer Security Certification of Trusted Systems. 1995-12-16.
  • 2Denning D E. A Lattice Model of Securc Information Flow. Communications of the ACM, 1976,19(5):236-243.
  • 3Goguen J A, Meseguer J. Security Policies and Security Models. Proceedings of the IEEE Symposium on Security and Privacy, Oackland,California, 1982-04:11-20.
  • 4Kemmerer R A.Shared Resource Matrix Methodology: A Practical Approach to Indetifying Covert Channels. ACM Transactions on Computer Systems, 1983,1(3):256-277.
  • 5Porras P A ,Kemmerer R A. Covert Flow Trces:A Technique for Indetifying and Analyzing Covert Storge Channels. IEEE Computer Society Symposium on Research in Security and Privacy Oakland,CA, 1991-05:36-51.
  • 6Tsai C R, Gligor V D, Chandersekaran C S. A Formal Method for the Identification of Coven Storage Channels in Source Code. In IEEE Symposium on Security and Privacy,IEEE Computer Society, Computer Society Press, 1987-04:74-86.
  • 7Lampson B W. A note on the confinement problem[J].CACM, 1973,16(10):613-615.
  • 8Dorothy Denning. A lattice model of secure information flow[J]. Comm of the ACM, 1976,19(5):236-246.
  • 9Richard A Kemmerer. Shared resource matrix methodo-logy: a practical approach to indetifying covert channels[J]. ACM Transactions on Computer Systems, 1983,1(3):256-277.
  • 10Richard A Kemmerer. A practical approach to identi-fying storage and timing channels: twenty years later[A].In:Proceedings of the 18th Annual Computer Security Applications Conference 2002 IEEE[C].USA: Washington DC, IEEE Computer Society, 2002.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部