期刊文献+

Analysis of system trustworthiness based on information flow noninterference theory 被引量:1

Analysis of system trustworthiness based on information flow noninterference theory
下载PDF
导出
摘要 The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans- fer. To solve this problem, the impact of the system state on trust- worthiness of software is investigated, the run-time mutual interfer- ence behavior of software entitles is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat- form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Finally, the monitor hypothesis is extended to the dynamic monitor hypothe- sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation. The trustworthiness analysis and evaluation are the bases of the trust chain transfer. In this paper the formal method of trustworthiness analysis of a system based on the noninterfer- ence (NI) theory of the information flow is studied. Firstly, existing methods cannot analyze the impact of the system states on the trustworthiness of software during the process of trust chain trans- fer. To solve this problem, the impact of the system state on trust- worthiness of software is investigated, the run-time mutual interfer- ence behavior of software entitles is described and an interference model of the access control automaton of a system is established. Secondly, based on the intransitive noninterference (INI) theory, a formal analytic method of trustworthiness for trust chain transfer is proposed, providing a theoretical basis for the analysis of dynamic trustworthiness of software during the trust chain transfer process. Thirdly, a prototype system with dynamic trustworthiness on a plat- form with dual core architecture is constructed and a verification algorithm of the system trustworthiness is provided. Finally, the monitor hypothesis is extended to the dynamic monitor hypothe- sis, a theorem of static judgment rule of system trustworthiness is provided, which is useful to prove dynamic trustworthiness of a system at the beginning of system construction. Compared with previous work in this field, this research proposes not only a formal analytic method for the determination of system trustworthiness, but also a modeling method and an analysis algorithm that are feasible for practical implementation.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第2期367-380,共14页 系统工程与电子技术(英文版)
基金 supported by the Natural Science Foundation of Jiangsu Province(BK2012237)
关键词 trusted computing trust chain intransitive noninterference(INI) dynamic trustworthiness access control trusted computing,trust chain,intransitive noninterference(INI),dynamic trustworthiness,access control
  • 相关文献

参考文献5

二级参考文献33

  • 1李焕洲,林宏刚,张健,郭东军.可信计算中完整性度量模型研究[J].四川大学学报(工程科学版),2008,40(6):150-153. 被引量:10
  • 2沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 3王远,吕建,徐锋,张林.一个适用于网构软件的信任度量及演化模型[J].软件学报,2006,17(4):682-690. 被引量:50
  • 4沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 5Shen Chang-Xiang, Zhang Huan -Guo, Feng Deng- Guo, Cao Zhen-Fu, Huang Ji-Wu. Survey of information security. Science in China Series F: Information Sciences, 2007, 50(3): 273-298.
  • 6Sadeghi Ahmad-Reza, Selhorst Marcel, Stable Christian, Winandy Marcel. TCG Inside? A note on TPM specification compliance//Proceedings of the 1st Benelux Workshop on Information and System Security. Belgium, 2006.
  • 7Jaeger Trent, Sailer Reiner, Shankar Umesh. PRIMA: Policy-Reduced Integrity Measurement Architecture//Proceedings of the 11th ACM Symposium on Access Control Models and Technologies ( SACMAT 2006 ). Lake Tahoe, California, 2006: 134-143.
  • 8Rushby John. Noninterference, transitivity and channel-control security policies. Stanford Research Institute, Menlo Park: CSL Technical Report CS-92-02, 1992.
  • 9黄强.基于可信计算的终端安全体系结构研究[博士学位论文].海军工程大学,武汉,2007.
  • 10Garfinkel Tal, Pfaff Ben et al. Terra: A virtual machinebased platform for trusted computing//Proceedings of the SOSP03. 2003: 193-206.

共引文献327

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部