期刊文献+

概率系统的非传递无干扰安全属性分析 被引量:1

Analysis for intransitive noninterference security properties in probabilistic systems
下载PDF
导出
摘要 为了实现概率信息的安全降密和信道控制等重要安全策略,将可信域的概念引入概率安全进程代数,并以此为工具将非传递无干扰信息流安全模型推广到概率系统.在弱概率互拟等价的基础上讨论了非传递概率信息流安全属性,提出了非传递概率互拟强无干扰(I_BSPNI)和非传递概率互拟复合不可演绎(I_PBNDC)安全属性;并要求系统所有可达状态都满足的持久I_PBNDC属性,该性质能够揭露出I_PBNDC在动态环境中不能暴露的安全隐患.为了弥补互拟复合不可演绎类性质难于验证的缺点,使用基于单步状态的展开条件定义了强I_PBNDC属性.最后分析并证明了这些安全属性之间的包含关系. The concept of trust domain was introduced into probabilistic secure process algebra (PSPA), and the intransitive noninterference information flow security model was extended to probabilistic systems to implement many important security policies such as secure downgrading of probabilistic information and channel control. Intransitive probabilistic information flow security properties were analyzed based on the probabilistic weak bisimulation equivalence. Intransitive bisimulation strong probabilistic noninterference (I_BSPNI) and intransitive probabilistic bisimulation-based nondeducibility on composition (I_PBNDC) were presented. To expose the potential secure problem that I_ PBNDC cannot discover in dynamic context, the persistent I_PBNDC property was proposed, which required that every reachable state of the system must satisfy I_PBNDC. The properties like bisimulation-based nondeducibility on composition are difficult to prove. To overcome this shortcoming, strong I PBNDC property was defined in terms of unwinding conditions demanding properties of individual actions. Finally, the relations between these proper- ties were given and proved.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2008年第12期2092-2096,共5页 Journal of Zhejiang University:Engineering Science
基金 国家"863"高技术研究发展计划资助项目(2006AA01Z431)
关键词 非传递无干扰 信息流安全 概率系统 进程代数 弱互拟 intransitive noninterference information flow security probabilistic system process algebraweak bisimulation
  • 相关文献

参考文献9

  • 1GOGUEN J A, MESEGUER J. Security policies and security models [C]//Proceedings of the 1982 IEEE Symposium on Research in Security and Privacy. Oakland: IEEE, 1982:11-20.
  • 2SABELFELD A, SANDS D. Dimensions and principles of declassification [C]// Proceedings of the 18th IEEE Computer Security Foundations Workshop. Aix-en-Provence: IEEE, 2005:255-269.
  • 3RUSHBY J. Design and verification of secure systems [C]//Proceedings of the 8th ACM Symposium on Operating System Principles. Pacific Grove: ACM, 1981: 12-21.
  • 4RUSHBY J. Noninterference, transitivity, and channelcontrol security policies [R]. Menlo Park ,USA: Stanford Research Institute, 1992.
  • 5FOCARDI R, GORRIERI R. A classification of security properties for process algebras [J]. Journal of Computer Security, 1995, 3(1) :5 - 33.
  • 6ALDINI A, BRAVETTI M, GORRIERI R. A processalgebraic approach for the analysis of probabilistic noninterference [J]. Journal of Computer Security, 2004, 12 (2) :191 - 245.
  • 7赵保华,陈波,陆超.概率信息流安全属性分析[J].计算机学报,2006,29(8):1447-1452. 被引量:6
  • 8BOSSI A, FOCARDI R, PIAZZA C, et al. Verifying persistent security properties [J]. Computer Languages, Systems & Structures, 2004, 30(3/4): 231-258.
  • 9BOSSI A, PIAZZA C, ROSSI S. Modelling downgrading in information flow security [C]// Proceedings of the 17th IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE, 2004: 187-201.

二级参考文献1

共引文献5

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部