期刊文献+

基于无干扰理论的交换行为可信性分析方法

Method for trust analysis of exchange process behavior based on noninterference
下载PDF
导出
摘要 针对目前数据安全交换中缺乏对交换行为的动态监管,无法保障数据交换的安全实施问题,提出一种基于无干扰理论的交换行为可信性分析方法。该方法首先从交换进程的角度对交换行为进行形式化建模,然后将无干扰理论与可信计算的思想相结合,提出不同阶段、不同模式下交换行为可信的约束规则,交换行为可信性判定定理及安全证明,最后结合一个具体的应用示例说明该方法的可用性。 Aiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is formalized from the perspective of the exchange process.Then,the exchange behavior trust constraint rules,exchange behavior trust judgment theorem and security proof are given in different stages and different mode.Finally,a concrete application example shows the availability of the method.
出处 《通信学报》 EI CSCD 北大核心 2014年第12期144-152,共9页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2011CB311801) 国家高技术研究发展计划("863"计划)基金资助项目(2012AA012704) 河南省科技创新人才计划基金资助项目(114200510001)~~
关键词 无干扰策略 受控交换 进程行为 可信 noninterference policy controlled exchange process behavior trust
  • 相关文献

参考文献26

  • 1GOGUEN J, MESEGUER J. Security policies and security models[A]. Proc IEEE Symp on Security and Privacy[C]. Oak-land, 1982.11-20.
  • 2SUTHERL D. A model of infonnation[A]. Proc 9th National Computer Security ConqC]. 1986.175-183.
  • 3WITIBOLD J T, JOHNSON M. Information flow in non- deterministic systems[A]. IEEE Symposium on Security and Privacy[C]. 1990.144-161.
  • 4MCCULLOUGH D. Noninterference and the composability of security properties[A]. Proc IEEE Symp on Security and Privacy[C]. 1988.177-186.
  • 5FOCARDI R, GORRIERI R. Classification of security properties(part I: information flow)[J]. Foundations of Security Analysisand Design, 2001,2171:331-396.
  • 6RYAN P. Mathematical models of computer security[J]. Foundations of Security Analysis and Design, 2001, 2171: 1-62.
  • 7GOGUEN J, MESEGUER J. Unwinding and inference control[A]. IEEE Symp on Security and Privacy[C]. 1984.75.
  • 8ROSCOE A W, GOLDSMITH M H. Wbat is intransitive noninterference[A]. Proceedings of the 12th IEEE Computer Security Foundations Workshop[C]. 1999.228-238.
  • 9RUSHBY J M. Design verification of secure systems[A]. Proceedings of the eighth ACM symposium on Operating systems principles[C]. 1981.12-21.
  • 10BOEBER E, KAIN R. A practical alternative to hierarchical integrity policies[A]. Proceedings of the Computer Security Initiative Conference[C]. 1985.

二级参考文献70

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部