期刊文献+

扩展不干扰模型(ENISM)及基于CSP的描述和验证方法 被引量:1

An Extended Non-Interference Security Model(ENISM) and Its CSP-Based Description and Verification Method
下载PDF
导出
摘要 在不干扰理论的基础上,提出扩展不干扰模型ENISM及其验证方法,用以描述和分析操作系统中的信息流策略.工作包括:(1)依据系统功能模块定义多个执行域,以即将执行的可能动作序列集合与可读取的数据存储值集合一同作为ENISM定义执行域安全状态的基础;(2)给出判定系统中不存在违反策略的执行轨迹和数据流动的条件ENISM-CC;(3)基于通信顺序进程给出ENISM-CC的语义及操作系统模块设计的形式化描述和验证方法. Based on the theory of non-interference, this paper proposes an extended non-interference security model ENISM, for the purpose of specification and analysis of information flow policies in operating systems. This paper includes the following works, firstly, system modules would be recognized as domains, and the traces set which contains traces may be implemented after a system state and the data values set at the state are two most important analysis gist for defining the secure states in ENISM. Secondly, the sufficient conditions ENISM-CC are proposed on which unsafe traces and data flow is not existed. Thirdly, this paper gives out a formal description method for system design and describes the semantic ENISM-CC based on the Communicating Sequential Processes CSP.
出处 《计算机学报》 EI CSCD 北大核心 2010年第5期877-889,共13页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2007AA01Z409) 国家自然科学基金(60473093)资助~~
关键词 不干扰模型 通信顺序进程 形式化描述 形式化验证 完整性 non-interference model communicating sequential processes formal description formal verification integrity
  • 相关文献

参考文献11

  • 1Goguen J,Mesegue J.Security policies and security mod-els//Proceedings of the 1982 Symposium on Security and Privacy.Los Alamitos,1982:11-20.
  • 2Haigh J,Young W.Extending the non-interference model of MLS for SAT//Proceedings of the 1986 Symposium on Security and Privacy.Oakland,CA,1986:232-239.
  • 3Rushby J.Noninterference,transitivity,and channel-control security policies.Stanford Research Institute,Menlo Park:Technical Report CSL-92-02,1992.
  • 4谢钧,黄皓.一个非确定系统的不干扰模型[J].软件学报,2006,17(7):1601-1608. 被引量:5
  • 5Ryan P Y A,Schneider S A.Process algebra and non-interference.Journal of Computer Security,2001,9(1/2).75-103.
  • 6Roscoe A W,Woodcock J C P,Wulf L.Non-interference through determinism//Proceedings of the European Symposium on Research in Computer Security (ESORICS).LNCS 875,1994:33-54.
  • 7Graham C J.Some laws of non-interference//Proceedings of the Computer Security Foundations Workshop.Franconia,USA,1992:22-33.
  • 8Roscoe A W,Goldsmith M H.What Is Intransitive Noninterference? Mordano,Italy:Computer Security Foundations Workshop,1999:228-238.
  • 9马建平,余祥宣,洪帆,张江陵.一个完整的无干扰模型[J].计算机学报,1997,20(11):1034-1037. 被引量:3
  • 10Hoare C A R.Communicating Sequential Processes.New Jersey,USA:Prentice-Hall,1985.

二级参考文献13

  • 1余祥宣,计算机研究与发展,1995年,32卷,10期,38页
  • 2马建平,硕士学位论文,1994年
  • 3梁洪亮,孙玉芳,赵庆松,张相锋,孙波.一个安全标记公共框架的设计与实现.软件学报,2003,14(3):547-552.http://www.jos.org.cn/1000-9825/14/547.htm
  • 4Peri RV.Specification and verification of security policies[Ph.D.Thesis].Virginia:University of Virginia,1996.
  • 5Goguen J,Meseguer J.Security policies and security models.In:Proc.of the 1982 IEEE Symp.on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,1982.11-20.http://doi.ieeecomputersociety.org/10.1109/SP.1982.10014
  • 6Rushby J.Noninterference,transitivity,and channel-control security policies.Technical Report,CSL-92-02,Menlo Park:Stanford Research Institute,1992.
  • 7Zheng L,Myers AC.Dynamic security labels and noninterference.In:Dimitrakos T,Martinelli F,eds.Proc.of the 2nd Int'l Workshop on Formal Aspects in Security and Trust (FAST).Toulouse:Springer-Verlag,2004.27-40.
  • 8Sabelfeld A,Myers AC.Language-Based information-flow security.IEEE Journal on Selected Areas in Communications,2003,21(1):1-15.
  • 9Hicks M,Tse S,Hicks B,Zdancewic S.Dynamic updating of information-flow policies.In:Sabelfeld A,ed.Proc.of the Int'l Workshop on Foundations of Computer Security (FCS).Chicago,2005.7-18.http://www.cs.chalmers.se/~andrei/FCS05/fcs05.pdf
  • 10Ryan P,McLean J,Millen J,Gligor V.Non-Interference,who needs it? In:Proc.of the 14th IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,2001.237-241.http://csdl.computer.org/comp/proceedings/csfw/2001/1146/00/11460237.pdf

共引文献6

同被引文献13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部