期刊文献+

基于不干扰理论的信道控制策略及其自动化验证方法

Channel control strategy based on noninterference theory and its automated verification scheme
下载PDF
导出
摘要 通过研究信道与那些向其输入信息或从其获得信息的信息域之间直接或间接的干扰关系,来定义信道的语义和作用。明确描述和严格控制系统模块和进程之间的信息通道,有利于最大限度地保障模块或进程的完整性和可控性。所提出的信道控制策略正是基于上述目的。而针对信道控制策略复杂而不便于手工验证的特点,提出了基于通信顺序进程(CSP)的系统和策略描述方法以及基于FDR2的系统信息流策略自动化验证方法。该方法能够在少量的人工参与的情况下有效地分析信道控制策略,发现大部分存储隐蔽通道。 The authors defined the semantic description and functions of channels based on the study of the direct or indirect relation between any information domain and other domains who sent information to it or received from it.Exactly defining and strictly controlling the information channels between system modules or processes was beneficial to the integrity and controllability of the modules or processes.And in this paper,the new channel control strategy was used for this purpose.Channel control strategies were generally not easy to be manually verified because of their complexity.The authors presented an approach of describing system and strategies based on Communicating Sequential Processes(CSP)syntax and verifying the strategies in systems with automated verification tools FDR2.This approach can effectively and efficiently analyze the information channels and find out most of the storage covert channel.
作者 崔隽 黄皓
出处 《计算机应用》 CSCD 北大核心 2010年第3期708-714,共7页 journal of Computer Applications
基金 国家863计划项目(2007AA01Z409) 江苏省高技术项目(BE2008124)
关键词 不干扰模型 信道控制 信息流 通信顺序进程 形式化验证 noninterference model channel control information flow Communicating Sequential Processes(CSP) formal verification
  • 相关文献

参考文献9

  • 1GOGUEN J,MESEGUER J.Security policies and security models[C]// Proceedings of the 1982 IEEE Symposium on Research in Security and Privacy.Los Alamitos:IEEE Computer Society,1982:11-20.
  • 2HAIGH J,YOUNG W.Extending the non-interference model of MLS for SAT[C]// Proceedings of the 1986 Symposium on Security and Privacy.Oakland,CA:IEEE Computer Society,1986:232-239.
  • 3ROSCOE A W,WOODCOCK J C P,WULF L.Non-interference through determinism[J].Journal of Computer Security,1996,4(1):27-54.
  • 4ROSCOE A W.CSP and determinism in security modeling[C]// Proceedings of the 1995 IEEE Symposium on Security and Privacy.Washington,DC:IEEE Computer Society,1995:114-127.
  • 5Formal Systems (Europe) Ltd.FDR2 user manual[EB/OL].[2009-07-20].http://www.fsel.com/documentation/fdr2/html/index.html.
  • 6ROSCOE A W,GOLDSMITH M H.What is intransitive noninterference?[C]// Proceedings of the 12th Computer Security Foundations Workshop.Mordano,Italy:IEEE Computer Society,1999:228-238.
  • 7RUSHBY J.Noninterference,transitivity,and channel-control security policies[R].Menlo Park:Stanford Research Institute,1992.
  • 8HOARE C A R.Communicating sequential processes[J].Communications of the ACM,1978,21(8):666-677.
  • 9ROSCOE A W.The theory and practice of concurrency[M].Upper Saddle River,NJ:Prentice-Hall,1997.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部