期刊文献+

基于安全进程代数的信息流安全模型的分析与验证

Security Process Algebra-Based Analysis and Verification of Information Flow Security Model
下载PDF
导出
摘要 基于信息流的安全模型相对于基于访问控制的安全模型就刻画安全的性质而言更为本质。在安全进程代数统一框架下描述并形式化定义6种信息流安全模型,并且基于迹语义分析其逻辑蕴含关系,进一步对基于安全进程代数的6种信息流安全模型给出验证算法,并开发出验证工具,最后通过实例说明了该验证工具的使用。 In characterizing security, the information flow security models capture more essence than the access control security models. Within the unified framework of security process algebra, this paper describes and formally defines six types of information flow security models and analyzes their relationship of logical implication based on trace semantics. Furthermore, both the verification algorithm and the verification tools are developed for the six information flow security models based on security process algebra. Finally, several examples are presented for their utilization.
出处 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2012年第1期102-106,115,共6页 Journal of East China University of Science and Technology
基金 国家自然科学基金(60473055 60773094) 上海市曙光计划(07SG32) 安徽省高校省级自然科学研究基金项目(KJ2011Z279) 滁州学院自然科学基金项目(2010kj008Z)
关键词 安全进程代数 信息流安全模型 非推断模型 非干扰模型 分离模型 security process algebra information flow security model non-inference model non-interference model separability model
  • 相关文献

参考文献13

  • 1周伟,尹青,王清贤.计算机安全中的经典模型[J].计算机科学,2004,31(3):195-200. 被引量:5
  • 2Ryan P Y A,Schneider S A.Process algebra and non-inter-ference[J].Journal of Computer Security,2001,9(1):75-103. 被引量:1
  • 3Goguen J,Meseguer J.Unwinding and inference control[C] //Proceedings of the IEEE Symposium on Research inSecurity and Privacy.Oakland:Computer Society,1984:75-86. 被引量:1
  • 4Foley S N.A universal theory of information flow[C] //Proceedings of the IEEE Symposium on Research in Securityand Privacy.USA:IEEE Press,1987:116-122. 被引量:1
  • 5Roscoe A W.The Theory and Practice of Concurrency[M].USA:Prencice-Hall,1997. 被引量:1
  • 6Focardi R,Gorrieri R.A classification of security propertiesfor process algebras[J].Journal of Computer Security,1994,3(1):5-33. 被引量:1
  • 7Focardi R,Gorrieri R.Classification of security properties:Part I.Information flow[C] //Foundations of Security Analy-sis and Design-Tutoral Lectures.London,UK:Springer-Verlag,2001:331-396. 被引量:1
  • 8Akella R,Tang Han,Mcmillin B M.Analysis of informationflow security in cyber-physical systems international[J].Journal of Critical Infrastructure Protection,2010,3(3):157-173. 被引量:1
  • 9Keller R.Formal verification of parallel programs[J].Com-munications of the ACM,1976,19(7):561-572. 被引量:1
  • 10周伟,尹青,郭金庚.计算机安全中的无干扰模型[J].计算机科学,2005,32(2):159-165. 被引量:9

二级参考文献46

  • 1Roscoe A W. CSP and determinism in security modeling. In:Proc. of the 1995 IEEE Symposium on Security and Privacy,IEEE Computer Society,1995. 114~127. 被引量:1
  • 2Roscoe A W. The Theory and Practice of Concurrency. PrenticeHall, 1997. 被引量:1
  • 3Roscoe A W,Woodcock J C P,Wulf L. Non-interference through Determinism. In: Proc. of European Symposium on Research in Computer Security 1994 ( ESORICS'94 ), LNCS, Vol. 875,Springer-Verlag 1994.33~53. 被引量:1
  • 4Ryan P Y A. A CSP formulation of non-interference and unwinding. Presented at CSFW 1990 and published in Cipher, Winter 1990/1991. 19~30. 被引量:1
  • 5Ryan P Y A. Mathematical models of computer security. In:Foundations of Security Analysis and Design - Tutorial Lectures (R. Focardi and R. Gorrieri Eds), LNCS, Vol. 2171, SpringerVerlag,2001.1~62. 被引量:1
  • 6Ryan P Y A, Schneider S A. Process algebra and non-interference. Journal of Computer Security, 2001,9(1,2): 75~ 103. 被引量:1
  • 7Schneider S A. May Testing,Non-interference and Compositionality: [Technical Report CSD-TR-00-02 2001]. Royal Holloway,University of London. 被引量:1
  • 8Stirling C. Modal and temporal logics for processes. LNCS,Vol.1043 ,Springer-Verlag, 1996. 149~237. 被引量:1
  • 9Sutherland D. A model of information. In:Proc. of the ninth National Computer Security Conf. 1986. 175~183. 被引量:1
  • 10Zakinthinos A, Lee S. A general theory of security properties. In:Proc. of the 1997 IEEE Symposium on Research in Security and Privacy,IEEE Computer Society Press, 1997. 94~102. 被引量:1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部