期刊文献+

基于模型检测的信息流策略安全性分析 被引量:1

Security analysis of information flow policy on model checking
下载PDF
导出
摘要 分布式信息流控制是增强系统安全的一种有效方法,但其灵活性也增加了策略管理和分析的复杂性。策略的安全性分析判定系统的所有可达状态是否都能保持特定的安全属性,可以验证策略是否一致完备地满足安全需求。形式化定义了基于Kripke结构和计算树时序逻辑的信息流策略安全性分析问题,验证信息流允许、禁止和授权管理三类信息流安全目标,提出了分支限界和模型检测两种策略验证算法。实验结果表明,算法可有效验证分布式信息流控制系统是否满足特定安全需求,提高了分布式信息流控制的可用性。 Decentralized information flow control( DIFC ) is an effective method for enhancing security of systems, but its fle- xibility also increases the complexity of policy analysis and management. Security analysis of policy decides whether all the reachable states of the system keep some security property, and validates whether the policies satisfy the security requirements consistently and completely. Based on Kripke structure and computation tree logic, this paper proposed security analysis prob- lem for DIFC (SAP-DIFC) formally. It verified three information flow goals, like information flow allow/forbidden and author- ization management. It proposed two policy Verification methods, branch and bound method, and model checking. The experi- mental results show that the algorithms effectively verify whether the DIFC system satisfies the security requirements, and im- prove the usability of DIFC.
出处 《计算机应用研究》 CSCD 北大核心 2016年第8期2429-2432,共4页 Application Research of Computers
基金 核高基项目(2013ZX01029002-001-001) 国家"863"计划资助项目(2013AA013203 2013AA01A210)
关键词 策略安全性分析 分布式信息流控制 模型检测 计算树逻辑 KRIPKE结构 security analysis of policy decentralized information flow control model checking computation tree logic Kripke structure
  • 相关文献

参考文献13

  • 1Pasquier T F J M, Bacon J, Eyers D. FlowK : information flow control for the cloud[ C]//Proc of the 6th IEEE International Conference on Cloud Computing Technology and Science. [ S. L ] : IEEE Press, 2014:70-77.
  • 2Efstathopoulos P, Krohn M, Vandebogart S, et al. Labels and event processes in the asbestos operating system[ J]. ACM SIGOPS Ope- rating Systems Review,2005,39 ( 5 ) : 17- 30.
  • 3Krobn hi, Zip A, Brodsky M, el a]. Information flow control for standard OS abstractions[ C ]//Proc of the 21th ACM SIGOPS Sympo- sium on Operating Systems Principles. New York:ACM Press, 2007: 321-334.
  • 4Li Ninghui, Tripunitara M. Security analysis in role-based access control[ J ]. ACM Trans on Information and System Security, 2006,9(4) :391-420.
  • 5Jha S, Li Ningbui, TrJpunitara M, el a]. Towards formal verification of role-based access control policies[ J]. IEEE Trans on Dependa- ble and Secure Computing,2008,5(4) :242-255.
  • 6Jha S, Sural S, Vaidya J, et al. Security analysis of temporal RBAC under an administrative model [ J ]. Computers & Security, 2014, 46 : 154-172.
  • 7Chaudhuri A, Naldurg P, Rajamani S K, et al. EON: modelilag and analyzing dynamic access control systems with logic programs [ C ]// Proc of the 15th ACM Conference on Computer and Communications Security. New York : ACM Press, 2008 : 381- 390.
  • 8Jha S, Sural S, Vaidya J, et al. Temporal RBAC security analysis using logic programming in the presence of administrative policies [ M ]Information Systems Security. Berlin : Springer, 2014 : 129- 148.
  • 9Yang Zbi, Yin Libua, Jin Shnyuan, et al. Towards formal security analysis of decentralized information flow control policies [ J ]. Interna- tional Journal of Innovative Computing, Information and Con- trol ,2012,8( 11 ) :7969-7981.
  • 10Zhao Mingyi, Liu Peng. Modeling and checking the security of DIFC system configurations[ M]//Automated Security Management. Berlin: Springer, 2013 : 21 - 38.

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部