期刊文献+

基于iP-可观测属性的动态非传递无干扰模型

Dynamic Intransitive Noninterference Model Based on iP-observability Attribute
下载PDF
导出
摘要 针对现有信息流模型对于系统动态可信性判定过于严格的问题,提出一种基于iP-可观测属性检查的动态非传递无干扰模型。将系统抽象为一个六元组,从无干扰理论、系统状态可观察性和系统状态影响因素三方面出发,通过引入iP-可观测属性,经由有限状态自动机模型,将其转变为有限状态自动机中的P-可观测属性,并进一步利用P-可观测属性检查算法反推原系统满足动态非传递无干扰理论。对抽象系统实例的分析结果验证了该模型的有效性。 In order to solve the problem that the existing information flow model is too strict to determine the dynamic trusted of system,a dynamic Intransitive Noninterference(INI)model based on iP-observability attribute checking is proposed.It abstracts the system into a six-tuple,which introduces the iP-observability attribute from the noninterference theory,the observability of system states and system states’influencing factors,and transforms the iP-observability into P-observability attribute in automatic machine by automatic machine model,and then uses the P-observability attribute checking algorithm to reverse that the original system can meet the Dynamic INI(DINI)theory.Finally,an example of the corresponding abstract system is given to illustrate the effectiveness of the model.
作者 迮恺 陈丹 庄毅 ZE Kai;CHEN Dan;ZHUANG Yi(College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第12期173-177,183,共6页 Computer Engineering
基金 国家自然科学基金(61572253) "十三五"装备预研共用技术和领域基金(61402420101HK02001) 航空科学基金(2016ZC52030)
关键词 iP-可观测属性 非传递无干扰 P-可观测属性 属性检查算法 自动机模型 iP-observability attribute Intransitive Noninterference(INI) P-observability attribute attribute checking algorithm automatic machine model
  • 相关文献

参考文献2

二级参考文献16

  • 1唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 2张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4Trusted Computing Group. TPM Main Part l Design Principles Specification Version 1.2[EB/OL][2012-10-29]. http://www. trustedcomputinggroup.org/files/resource_files/646BE624-1D09-3519-ADDA61BE37A21A74/mainP1DPrev103.pdf.
  • 5Trusted Computing Group. TCG Specification Architecture Overview[EB/OL][2012-10-29]. http://www.Trustedcomputing. group.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf.
  • 6Goguen J A, Meseguer J. Security Policies and Security Models[C]//Proc. of IEEE Symp. on Security and Privacy. Los Alamitos, USA: IEEE Computer Society, 1982.
  • 7Rushby J. Noninterference, Transitivity, and Channel-control Security Policies[R]. Stanford Research Institute, Tech Rep: CSL-92-02, 1992.
  • 8Harrison M A, Ruzzo W L, Ullman J D. Protection in Operating Systems[J]. Communications of the ACM, 1976, 19(8): 461-471.
  • 9赵佳,沈昌祥,刘吉强,韩臻.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980. 被引量:29
  • 10张兴,陈幼雷,沈昌祥.基于进程的无干扰可信模型[J].通信学报,2009,30(3):6-11. 被引量:28

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部