期刊文献+

一种保持多等级安全策略细化后无干扰属性的方法

A Method to Keep Noninterference in Multi-level Security Policy Refinement
下载PDF
导出
摘要 针对多等级架构细化中安全属性(即无干扰属性)保持的问题,提出一个细化函数和若干细化规则。通过细化函数将安全域分解为若干子安全域,通过若干细化规则限定子安全域与其他安全域以及子安全域间需要满足的关系。使用4个定理对细化后的架构或者策略进行形式化的描述和分析,结果表明细化后的架构或者策略仍然保持原架构或者策略的安全属性(即无干扰属性)。 Based on the through study of the problem to keep security in architectural refinement in MLS system,a refinement function and several refinement rules were presented to refine the architecture. The refinement function refined the security domain into several sub-domains. The relation between sub-domain and other security domains and the relation between sub-domains were limited by the refinement rules. Four theorems were given to prove that noninterference remains in the architecture after refinement.
作者 吕从东 韩臻
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2015年第4期136-141,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 教育部博士点课题基金资助项目(RFDP20120009110007) 教育部创新基金资助项目(IRT201206) 铁道部信息技术中心课题资助项目(2012X010-B) 铁道部课题资助项目(2014F026)
关键词 降级结构 无干扰 架构细化 策略细化 downgrading architecture noninterference architecture refinement security policy refinement
  • 相关文献

参考文献21

  • 1Medvidovic N,Taylor R N. A classification and compari- son framework for software architecture description lan- guages [ J ]. IEEE Transactions" on Software Engineering, 2000,26( 1 ) :70 -93.
  • 2Goguen J A, Mesegure J. Security policies and security models [ C ]//Proceedings of 1982 Symposium on Security and Privacy. New York: IEEE. 1982 : 11 - 20.
  • 3Rushby J. Noninterference, transitivity, and channel-control security policies [ R ]. Menlo Park: SRI International Com- puter Science Laboratory, 1992.
  • 4Haigh J T, Young W D. Extending the noninterference version of MI: for SAT [ J ]. IEEE Transactions on Soft- ware Engineering, 1987,13 (2) : 141 - 150.
  • 5Philipps J, Rumpe B. Refinement of information flow ar- chitectures[ C ]//Proceedings of the First IEEE Internation- al Conference on Formal Engineering Methods, 1997 ( ICFEM' 97 ). Hiroshima: IEEE, 1997:203 - 212.
  • 6Barbosa M A. A refinement calculus for software compo- nents and architectures[ C]//Proceedings of the 10th Euro-pean Software Engineering Conference Held Jointly with 13th ACM SIGSOFY International Symposium on Founda- tions of Software Engineering. New York: ACM, 2005,30 (5) :377 -380.
  • 7Morieoni M, Qian Xialei. Correctness and composition of software architectures [ C ]//Proceedings of ACM Symposi- um on Foundations of Software Engineering( SIGSOb:r' 94). New York:ACM,1994,19(5) :164 - 174.
  • 8Moriconi M, Qian Xialei, Riemenschneider R A. Correct architecture refinement[J]. IEEE Transactions on Software Engineering: Special Issue on Software Architecture, 1995, 21 (4) :356 - 372.
  • 9Zhou J, Alves-Foss J. Architecture-based refinements for secure eomputer systems design [ C ]//Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services. New York : ACM,2006 : 15 - 26.
  • 10Zhou J,Alves-Foss J. Security policy refinement and en- forcement for the design of multi-level secure systems [ J]. Journal of Computer Security, 2008,16 (2) :107 - 131.

二级参考文献53

共引文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部