期刊文献+

信息流安全技术回顾与展望 被引量:3

Review and Prospect for Information Flow Security Technology
下载PDF
导出
摘要 随着计算机和网络技术的迅猛发展,计算机系统和开放式的网络系统受到的攻击也日益增多。访问控制、入侵检测、加密等传统的安全机制只注重控制信息的释放,不能充分保证信息端到端的安全。信息流的方法通过分析系统中信息的流动,确保流动的信息都是合法的。介绍了信息流的基本模型、信息流分析的几种典型方法及其应用,并对它们进行了分析比较,最后给出了现有的信息流分析方法中存在的问题和未来的研究方向。结果表明采用信息流分析方法实现信息端到端的安全是可行的。 With the rapid development of computer and network technology,their systems are also attacked increasingly.The conventional security mechanisms,such as access control,intrusion detection and encryption only focus on the controls of information release,without fully ensuring end-to-end security.By using information flow analysis in the system,we can ensure the legality of their information flow.This paper overviews the typical models of information flow and their corresponding analysis methods.It describes briefly the applications and comparisons of these methods.The paper also gives the future research directions for the analysis methods of information flow security.It concludes that the analysis methods of information flow are feasible to achieve the end-to-end information security.
出处 《南京邮电大学学报(自然科学版)》 2011年第5期87-96,共10页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(60703086 60873231 60873049 60973046) 江苏省高校自然科学基金(10KJB520015) 南京邮电大学自然科学研究基金(NY210009) 江苏省"青蓝工程"优秀青年骨干教师项目 广西可信软件重点实验室开放基金资助项目
关键词 信息流安全 语义模型 类型系统 形式化方法 information flow security semantic models type systems formal methods
  • 相关文献

参考文献18

二级参考文献147

共引文献67

同被引文献30

  • 1田振才,李泉.中国民航空中交通管理战略内核系统建设[J].空中交通管理,2007(1):8-9. 被引量:3
  • 2Myers A C,Nystrom N,Zheng L,et al. Jif:java infor- mation flow[EB/OL]. [2013-1-20]. http://www, es. cornell, edu/jif. 被引量:1
  • 3Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler ,et al. Making information flow explicit in hi star[C]//Proc 7th symposium on operating systems design and implementation. Seattle, USA: USENIX association Berkeley, 2006: 263-278. 被引量:1
  • 4Maxwell Krohn, Alexander Yip. Information flow control for standard OS abstraetions [C]//Proc SOSP'07. Washington DC: ACM press, 2007 : 321- 334. 被引量:1
  • 5Tiago Alves , Don Felton. Trust zone., integrated hardware and software security enabling trusted computing in embedded systems [J]. Information quarterly, 2004(4): 18-24. 被引量:1
  • 6Michael Dalton, Hari Kannan Raksha. A flexible in- formation flow architecture for software security [C]//Proc 34th ISCA. California: ACM press, 2007 : 482-493. 被引量:1
  • 7Neil Vachharajani Matthew J Bridges. RIFLE: an ar- chitectural framework for user-eentric information- flow security information-flow security[C]//Proceed- ings of the 37th international symposium on rnicroar- chitecture (MICRO- 37 ' 04). Portland: IEEE/ACM press, 2004 : 243-254. 被引量:1
  • 8Mohit Tiwari, Hassan M G Wassel, Bita Mazloom,et al. Complete information flow tracking from the gates up[C]//Proc 14th ASPLOS. Washington, DC.- ACM press, 2009: 109-120. 被引量:1
  • 9Wei Hu, Jason Oberg. Theoretical fundamentals of gate level information flow tracking[J]. IEEE trans on CAD,2011,30(8) :1128-1140. 被引量:1
  • 10William Enck, Peter Gilbert, Byung-Gon Chun, etal. Taint Droid: an information-flow tracking system for realtime privacy monitoring on smartphones [C]//Proceeding of the 9th USENIX symposium on operating systems design and implementation. Vancouver, BC, Canada: USENIX association Berkeley, 2010:393-408. 被引量:1

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部