期刊文献+

安全多执行机制的无干扰性研究 被引量:3

Research on Facial-lighting Normalization Methods
下载PDF
导出
摘要 无干扰是安全信息流的一个重要需求,安全多执行(SME)是实施无干扰的一种重要方式。本文通过实例指出了反应系统中SME模型在并发调度下可能违背运行无干扰特性,分析了导致这种情况的原因,提出了相应的解决方案。 Secure Multi-Execution (SME) is an important approach for enforcing non-interference, which is a critical requirement in the field of secure information flow. In this paper, RS-SME supporting asynchronous I/O, is analyzed. The result shows that RS-SME violates non-interference when executedin aconcurrent environment. The reason and its corresponding solutionare proposed.
出处 《软件》 2015年第6期83-87,共5页 Software
基金 国家自然科学基金项目(批准号:61100186 61262008) 广西自然科学基金(批准号:2014GXNSFAA118365 2014GXNSFDA118036)
关键词 无干扰 安全多执行 反应系统 Non-interference Secure multi-execution Reactive system
  • 相关文献

参考文献11

  • 1Kashyap V,Wiedermann B,Hardekopf B.Timing-and Termination-Sensitive Secure Information Flow:Exploring a New Approach. IEEE Symposium on Security and Privacy . 2011
  • 2Bielova N,Devriese D,Massacci F,Piessens F.Reactive Non-Interference for a Browser Model. International Conference on Network and System Security . 2011
  • 3Sun, Donghong,Guo, Yunchuan,Yin, Lihua,Hu, Changzhen.Comparison of measuring information leakage for fully probabilistic systems. International Journal of Innovative Computing, Information and Control . 2012
  • 4Jaskelioff M,Russo A.Secure Multi-Execution in Haskell. Proceedings of Andrei Ershov International Conference on Perspectives of System Informatics . 2011
  • 5Askarov A,Myers A C,Zhang D.Predictive Black-Box Mitigation of Timing Channels. ACM Conference on Computer and Communications Security . 2010
  • 6Devriese D,Piessens F.Noninterference through Secure Multi-Execution. IEEE Symposium on Security and Privacy . 2010
  • 7Austin T H,Flanagan C.Multiple Facets for Dynamic Information Flow. Proceedings of the ACM Symposium on Principles of Programming Languages . 2012
  • 8江连峰,赵佳宝.复杂事件处理技术及其应用综述[J].软件,2014,35(2):188-192. 被引量:6
  • 9郭云川,周渊,丁丽,郭莉.基于概率干扰的概率隐蔽通道仿真研究[J].通信学报,2009,30(2):59-64. 被引量:3
  • 10郭云川,方滨兴,殷丽华,周渊.一种面向移动计算的机密性与完整性模型[J].计算机学报,2013,36(7):1424-1433. 被引量:7

二级参考文献57

  • 1卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3王昌达,鞠时光.隐通道的仿真分析[J].系统仿真学报,2006,18(6):1488-1492. 被引量:5
  • 4赵保华,陈波,陆超.概率信息流安全属性分析[J].计算机学报,2006,29(8):1447-1452. 被引量:6
  • 5LAMPSON B W. A note on the confinement problem[J]. Communications of the ACM, 1973, 16(10): 613-615.
  • 6ZANDER S, ARMITAGE G, BRANCH P. Covert channels and countermeasures in computer network protocols[J]. IEEE Communications Surveys and Tutorials, 2007, 45(12): 136-142.
  • 7TSAI C R, GLIGOR V D.A bandwidth computation model for covert storage channels and its applications[A]. Proceedings of the 1988 IEEE[C]. 1988.108-121.
  • 8MILLEN J K. Finite-state noiseless covert channels[A]. Proceedings of the Computer Security Foundations Workshop[C]. 1989.81-86.
  • 9SHIEH S P. Estimating and measuring covert channels bandwidth in multilevel secure operating system[J]. Journal of Information Science and Engineering, 1999, (15): 91-106.
  • 10SONG L. Convert Channels and Anonymous Communication in Ad-Hoc Networks[D]. Maryland: University of Maryland, 2007.

共引文献14

同被引文献22

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部