期刊文献+

用信息流控制保证软件可信运行 被引量:1

SOFTWARE TRUSTED RUNNING ENSURED BY INFORMATION FLOW CONTROL
下载PDF
导出
摘要 提出一种基于信息流控制来保证软件可信运行的方法。首先设计一种信息流控制模型,该模型的访问规则、传播规则和感染规则基本涵盖了软件在操作系统运行过程中产生信息流的主要类型。其次,设计一种策略描述语言,该语言使软件管理者可以以一种较为直观的方式描述所期望的软件信息流。在Linux内核部分实现原型系统,实验证明该方法可以控制软件所产生的信息流,从信息流角度保证软件的可信运行。 A scheme is proposed in this paper which ensures the trusted running of software based on information flow control.First,we design an information flow control model,its access rules,propagation rules and infection rules basically cover main types of software's information flow generated in running process of operating system.Secondly,we design a policy depiction language which enables software administrators describe the expected software information flow in a more intuitive way.We partially implement the prototype system in the Linux kernel.Experiment demonstrates that the scheme is able to control information flow generated by the software,and ensures the trusted running of software in terms of information flow.
作者 张来顺
出处 《计算机应用与软件》 CSCD 2011年第4期289-293,共5页 Computer Applications and Software
关键词 信息流 可信 操作系统 标签 Information flow Trust Operating system Label
  • 相关文献

参考文献14

  • 1Trusted Computing Group. TCG specification architecture overview [ EB/OL].
  • 2Nickolai Zeldovich, et al. Making information flow explicit in HiStar[ C ]. The 7th Syrup on Operating Systems Design and Implementation ,2006.
  • 3Nickolai Zeldovich. Securing untrustworthy software using information flow control [ D]. Standford university,2007.
  • 4Petros Efstathopoulos,Alexander Yip,et al. Labels and Event Processes in the Asbestos Operating System [ J ]. ACM Transactions on Computer Systems,2007,25 (4) :1 - 11.
  • 5Krohn M, Alexander Yip, et al. Information Flow Control for Standard OS Abstractions [ C]//Proceedings of the 21th ACM Symposium on Operating Systems Principles ( SOSP' 07 ). Oct. 2007.
  • 6Trent Jaeger, Reiner Sailer, Umesh Shankar. PRIMA Policy-Reduced Integrity Measurement Architecture [ C ]//SACMAT'06,2006.
  • 7单智勇,石文昌.STBAC:一种新的操作系统访问控制模型[J].计算机研究与发展,2008,45(5):758-764. 被引量:5
  • 8Doug Wampler,James H Graham. A Normality Based Method for Detecting Kernel Rootkits [ J ]. ACM SIGOPS Operating systems review, 2008,42 ( 3 ).
  • 9Federico Maggi, Stefano Zanero, Vincenzo Iozzo. Seeing the Invisible: Forensic Uses of Anomaly Detection and Machine Learning [J]. ACM SIGOPS Operating systems review ,2008 ,d2 (3).
  • 10Ying Xia, Kevin Fairbanks, Henry Owen. A Program Behavior Matching Architecture for Probabilistic File System Forensics [ J ]. ACM SIGOPS Operating systems review ,2008,42 ( 3 ).

二级参考文献23

  • 1单智勇,孙玉芳.带二级缓冲机制的通用访问控制框架研究及实现[J].计算机学报,2004,27(11):1576-1584. 被引量:3
  • 2Loscocco P. , Smalley S.. Integrating flexible support for security policies into the Linux operating system. In: Proceedings of the USENIX Annual Technical Conference, Boston, 2001,29-42
  • 3Wright C. , Cowan C. et al. Linux Security Modules: General Security Support for the Linux Kernel. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, 2002,17-31
  • 4Abrams M. , LaPadula L. , Eggers K. , Olson I.. A generalized framework for access control: An informal description. In:Proceedings of the 13th National Computer Security Conference, Taiwan, 1990, 134-143
  • 5Denning D. E.. A lattice model of secure information flow.Communications of the ACM, 1976, 19(5) : 236-243
  • 6Bell D. E. , Lapadula L.J.. Secure computer system: Unified exposition and multics Interpretation. MITRE Corporation,Bedford: Mitre Report MTR-2997 Rev. 1, 1976
  • 7Hallyn S., Kearns P.. Domain and type enforcement for linux. In: Proceedings of the 4th Annual Linux Showcase and Conference, Atlanta, 2000, 247-260
  • 8Bell D.E.. Modeling the "Multipolicy Machine". In: Proceedings of the New Security Paradigm Workshop, 1994, 2-9
  • 9Bertino E.. A system to specify and manage multipolicy access control models. In: Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos, 1996, 94-102
  • 10]Lee Badger,Daniel F Sterne,David L Sherman,et al.A domain and type enforcement UNIX prototype[C].The 5th USENIX UNIX Security Symposium,Salt Lake,USA,1995

共引文献5

同被引文献13

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部