期刊文献+

电子机构的信息流控制研究

Research on Information Flow Control in Electronic Institution
下载PDF
导出
摘要 电子机构是解决自治主体间业务可信协同的一种开发框架,但其缺乏对信息流进行灵活控制的安全机制,可能会造成对机密信息的威胁。为此,在扩充电子机构语义的前提下,设计一种动态检测信息传递的安全模型。该模型根据强制访问控制的特点,依照级别标签来控制信息"不向下写",对传输数据的安全级别进行单独赋值,确保电子机构中所有授权通信路径的安全。将该安全模型引入电子机构可有效防止信息的非授权泄露,提高机构的信息流安全性。 Electronic Institution(EI) as a development framework is good for developing dependable distributed collaboration. However, due to its lack of information How control mechanism, the confidentiality of infbrmation may be threatened. By extending the semantics of electronic institution, this paper designs a security model that dynamically checks information transfer. As a result, all authorized communication paths are secure. The control process of the security model is illustrated via an example. The security model can prevent unauthorized information leakage and enhance securities of El based systems.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第2期120-122,125,共4页 Computer Engineering
基金 广西自然科学基金资助项目(0728089)
关键词 电子机构 访问控制 信息流 Electronic Institution(EI) access control: information flow
  • 相关文献

参考文献6

  • 1Egon L, van den B, Catholijn M, et al. Formal Modeling and Analysis of Organizations[C]//Proceedings of the 17th Belgium- Netherlands Conference on Artificial Intelligence. Brussels, Belgium: [s. n.], 2006.
  • 2Cai Guoyong, Gao Ji, Qian Junyan. Distributed Collaborating System Design via Electronic Institutional Calculus[C]// Proceedings of NPC'07. [S.l.]: IEEE Press, 2007: 754-761.
  • 3Milner R. Communicating and Mobile Systems; the π- Calculus[M]. Cambridge, UK: Cambridge University Press, 1999.
  • 4黄强,曾庆凯.基于SSA中间表示的源代码信息流分析[J].计算机工程,2009,35(13):166-168. 被引量:1
  • 5Enokido T, Barolli V, Takizawa M. A Legal Information Flow(LIF) Scheduler Based on Role-based Access Control Model[J]. Computer Standards & Interfaces, 2009, 31(5): 906-912.
  • 6Lim H, Park H, Choi S, et al. A Method for Detecting the Theft of Java Programs Through Analysis of the Control Flow Information[J]. Information and Software Technology, 2009, 51(9): 1338-1350.

二级参考文献5

  • 1Hsieh C S.A Fine-grained Data-flow Analysis Framework[J].Acta Informatica,1997,34(9):653-665.
  • 2Cytron R.Efficiently Computing Static Single Assignment Form and the Control Dependence Graph[J].ACM Trans,on Programming Languages and Systems,1991,13(4):451-490.
  • 3Kemmerer R A.Shared Resource Matrix Methodology:An Approach to Identifying Storage and Timing Channels[J].ACM Trans,on Computer Systems,1983,1(3):256-277.
  • 4Tsai C R.On the Identification of Covert Storage Channels in Secure Systems[J].IEEE Trans,on Software Engineering,1990,16(6):569-580.
  • 5Denning D E.A Lattice Model of Secure Information Flow[J].Communications of the ACM,1976,19(5):236-243.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部