期刊文献+

一种动态的隐通道消除算法 被引量:4

Dynamic Method for Covert Channels Elimination
下载PDF
导出
摘要 软件只有处于运行状态其中寄生的隐通道才能工作,并对系统形成实质性的安全威胁.应用软件的执行需要操作系统的支撑.在多安全级操作系统中,赋予主体的安全级是通过赋予用户和代表用户的进程实现的.本文提出一种基于进程调度的动态隐通道消除算法LTHC,其核心思想是在操作系统进程优先级调度算法的基础上增设安全级的约束,构造一个按安全级排列的进程运行阶梯,迫使信息只能单向地从低向较高的安全级流动.LTHC算法具有进程公平调度和处理死锁的机制,对存储隐通道和时间隐通道均有效. Only is lodging software running, covert channels are active and threat is tangible. Execution of application software depends on operating system. In multilevel secure operating system, security levels assign to subjects are implemented by give security levels to users and processes which represent users. A new algorithm for covert channels elimination named LTHC is presented to mandate sensitive information flows from low security level to higher only, which sort processes according to their security levels into an execution queue by add security level restrictions on process priority scheduling algorithm. LTHC can eliminate both storage channels and timing channels, moreover, it has mechanism to schedule processes fairly and avoid dead lock.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第2期236-241,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60773049)资助 江苏省自然科学基金项目(BK2007086)资助 江苏省高校自然科学研究计划项目(07KJB520016)资助 江苏大学高级人才项目(07JDG053)资助
关键词 隐通道 安全级 安全模型 安全策略 进程调度 covert channel security level security model security policy processes scheduling
  • 相关文献

参考文献5

二级参考文献59

  • 1卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 2王昌达,鞠时光,杨珍,郭殿春.隐通道存在的最小条件及其应用[J].计算机科学,2005,32(1):77-79. 被引量:5
  • 3[1]Lampson BW. A note on the confinement problem. CACM, 1973,16(10):.613~615.
  • 4[2]Tsai CR, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code. IEEE Trans. on Software Engineering, 1990,16(6):569~580.
  • 5[3]U.S. Department of Defense. Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, 1985.
  • 6[4]General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China. Classfied criteria for security protection of computer information system. GB 18859-1999, 1999 (in Chinese).
  • 7[5]Qing SH, Ji QG. Formal model design for secure operating systems. In: ITI 1st Int'l Conf. on Information and Communications Technology. 2003.
  • 8[6]Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer Systems, 1983,1(3):256~277.
  • 9[7]Porras PA, Kemmerer RA. Covert flow trees: A technique for identifying and analyzing covert storage channels. In: Proc. of the 1991 IEEE Computer Society Symp. on Research in Security and Privacy. 1991.36~51.
  • 10[8]McHugh J. Covert channel analysis: A chapter of the handbook for the computer security certification of trusted system. NRL Technical Memorandum 5540:062A, 1995.

共引文献68

同被引文献51

  • 1卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 2王昌达,鞠时光,杨珍,郭殿春.隐通道存在的最小条件及其应用[J].计算机科学,2005,32(1):77-79. 被引量:5
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4李暾,屈婉霞,郭阳,刘功杰,李思昆.基于符号模拟和约束逻辑编程的RTL级Verilog谓词抽象方法[J].计算机学报,2007,30(7):1138-1144. 被引量:1
  • 5GOGUEN J A,MESEGUER J.Security policies and security models[C] //Proc of IEEE Symposium on Research in Security and Privacy.1982:11-20.
  • 6McCULLOUGH D.Specifications for multi-level security and a hoo-kup property[C] //Proc of IEEE Symposium on Research in Security and Privacy.1987:161-166.
  • 7McLEAN J.A general theory of composition for trace sets closed under selective interleaving functions[C] //Proc of IEEE Symposium on Security and Privacy.1994:79-93.
  • 8ZAKINTHINOS A,LEE E S.A general theory of security properties[C] //Proc of IEEE Symposium on Security and Privacy.1997:94-102.
  • 9GOGUEN J A,MESEGUER J M.Unwinding and inference control[C] //Proc of Symposium on Security and Privacy.1984:75-86.
  • 10McCULLOUGH D.Noninterference and the composability of security properties[C] //Proc of IEEE Symposium on Research in Security and Privacy.1988:177-186.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部