Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an...Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process.展开更多
Based on the value function of the prospect theory,this paper constructs a security function,which is used to describe the victims’feelings about the distance in emergency evacuation.Since different paths between the...Based on the value function of the prospect theory,this paper constructs a security function,which is used to describe the victims’feelings about the distance in emergency evacuation.Since different paths between the demand points and the emergency shelters are generally of different importance degrees,they are divided into main paths and auxiliary paths.The security function values and the reliability levels of main paths and auxiliary paths are given different weights.The weighted sum of the security function values and the weighted sum of the reliability level function values of all demand points are maximized to determine the location and the number of the emergency shelters,the transfer paths,the reinforced edges and the incremental reliability level of the selected edge.In order to solve the model,a two-stage simulated annealing-particle swarm optimization algorithm is proposed.In this algorithm,the particle swarm optimization(PSO)algorithm is embedded into the simulated annealing(SA)algorithm.The cumulative probability operator and the cost probability operator are formed to determine the evolution of the particles.Considering the budget constraint,the algorithm eliminates the shelter combinations that do not meet the constraint,which greatly saves the calculation time and improves the efficiency.The proposed algorithm is applied to a case,which verifies its feasibility and stability.The model and the algorithm of this paper provide a basis for emergency management departments to make the earthquake emergency planning.展开更多
基金the Natural Science Foundation of Beijing (Grant No. 4052016)the National Natural Science Foundation of China (Grant No. 60573042)the National Grand Fundamental Research 973 Program of China (Grant No. G1999035802)
文摘Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process.
文摘Based on the value function of the prospect theory,this paper constructs a security function,which is used to describe the victims’feelings about the distance in emergency evacuation.Since different paths between the demand points and the emergency shelters are generally of different importance degrees,they are divided into main paths and auxiliary paths.The security function values and the reliability levels of main paths and auxiliary paths are given different weights.The weighted sum of the security function values and the weighted sum of the reliability level function values of all demand points are maximized to determine the location and the number of the emergency shelters,the transfer paths,the reinforced edges and the incremental reliability level of the selected edge.In order to solve the model,a two-stage simulated annealing-particle swarm optimization algorithm is proposed.In this algorithm,the particle swarm optimization(PSO)algorithm is embedded into the simulated annealing(SA)algorithm.The cumulative probability operator and the cost probability operator are formed to determine the evolution of the particles.Considering the budget constraint,the algorithm eliminates the shelter combinations that do not meet the constraint,which greatly saves the calculation time and improves the efficiency.The proposed algorithm is applied to a case,which verifies its feasibility and stability.The model and the algorithm of this paper provide a basis for emergency management departments to make the earthquake emergency planning.
基金Supported by the National Natural Science Foundation of China under Grant No.60373054(国家自然科学基金)the National High-Tech Research and Development Plan of China under Grant No.2002AA141080(国家高技术研究发展计划(863))