期刊文献+

基于信息流模型的TCB完整性策略分析方法与工具 被引量:1

Policy Analysis Methods and Tools of Information Flow Model Based on TCB Integrity
原文传递
导出
摘要 TCB(trusted computing base)完整性保护对于计算机系统安全具有十分重要的意义,目前的静态度量方法并不完善,而动态度量方法还很不成熟,因而提出一种基于策略的分析方法来分析系统TCB和域TCB的完整性.这一方法将系统策略文件中的描述解析成信息流形式,然后再将其抽象为有向图形式,最后利用图论中的方法分析信息流情况,给出完整性破坏的信息流传播路径.此方法的思想可以用在任何通过执行某些操作会产生信息流的环境中.根据这一方法,开发了一个原型工具,并以SELinux操作系统为例进行了实验分析.实验表明它能分析策略中的信息流向,并能实时给出策略违反图.此方法和工具可以作为现有完整性度量方法的有效补充. TCB integrity protection is of great significance.The static measurement method is not perfect,and the dynamic measurement method is still immature,so a policy-based method to analyze the integrity of the system TCB and domain TCB is proposed.This method parses the system policy file into the form of information flow,and then abstracts it out into the form of directed graph.At last the information flow of the graph is analyzed using graph theory,and the information flow propagation path of the integrity violation is given.The idea of this method can be used in any situations where performed operations will produce information flow.Based on this method,aprototype tool is developed.In the experiment,the integrity of TCB in the SELinux operation system is studied.The experiment indicates that the tool can analyze the information flow of the policy file,and give the policy violation graph in real time.This method and tool can be an effective complement of existing integrity measurement methods.
作者 胡伟 姬东耀
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2013年第5期431-437,共7页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(90604010) 中国科学院战略性先导专项(xda06010702)
关键词 信息流 完整性 类型强制模型 可信计算基 策略违反图 information flow integrity type enforcement(TE)model trusted computing base(TCB) policy violation graph
  • 相关文献

参考文献11

  • 1Shi E, Perrig A,l)oorn L V. BIND:A fine-grained at- testation service for secure distributed systems[C]// IEEE 2005 Symposium orl Security and Privacy ,Cali- fornia:lEEE cs, 2005:154- 168.
  • 2Jaeger T, Sailer R, Shankar U. PRIMA : Policy-reduced integrity measurement architecture [C]//Proceedings of the 2006 ACM Symposium of Access Control Mod els and Technolog'ies, New York : ACM, 2006 : 19 -28.
  • 3赵佳,沈昌祥,刘吉强,韩臻.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980. 被引量:29
  • 4张兴,陈幼雷,沈昌祥.基于进程的无干扰可信模型[J].通信学报,2009,30(3):6-11. 被引量:28
  • 5张兴,黄强,沈昌祥.一种基于无干扰模型的信任链传递分析方法[J].计算机学报,2010,33(1):74-81. 被引量:28
  • 6Peng Guojun, Pan Xuanchen, Zhang Huanguo, et al. Dynamic trustiness authentication framework based on software's behavior integrity[ C]/ / Proceedings of the 2008 International Conference for Young Computer Scientists, California: IEEE cs, 2008:2283-2288.
  • 7周洲仪,贺也平,梁洪亮.基于Biba和Clark-Wilson策略的混合强制完整性模型[J].软件学报,2010,21(1):98-106. 被引量:8
  • 8Smalley S. Configuring the SELinux Policy [R].Maryland.. NSA/NAI Labs, 2002: 2-7.
  • 9Duan Yuhong, Gao Yuelin, Li Jimin. A new adaptive particle swarm optimization algorithm with dynamically changing inertia weight[J]. Intelligent Information Management Systems and Technologies, 2006, 1 (3):461-470.
  • 10Xu Wenjuan,Zhang Xinwen, Hu Hongxin, et al. Re- mote attestation with domain-based integrity model and policy analysis[C]//IEEE Transactions on Dependa- ble And Secure Computing, 2012,9(3) : 429-442.

二级参考文献41

共引文献63

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部