期刊文献+

Trust Model Based on Structured Protection for High Level Security System 被引量:1

Trust Model Based on Structured Protection for High Level Security System
下载PDF
导出
摘要 In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
出处 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页 中国通信(英文版)
基金 supported by National Science and Technology Major Project under Grant No.2012ZX03002003 Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009 Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
关键词 trusted computing security assurance structured protection 信任模型 安全系统 结构化 保护级 信息系统 执行过程 功能部件 保护元件
  • 相关文献

参考文献20

  • 1SHEN ChangXiang,ZHANG HuanGuo,WANG HuaiMin,WANG Ji,ZHAO Bo,YAN Fei,YU FaJiang,ZHANG LiQiang,XU MingDi.Research on trusted computing and its development[J].Science China(Information Sciences),2010,53(3):405-433. 被引量:38
  • 2OOD. Trusted Computer System Evaluation Criteria (TCSEC) [S]. OOD520028-STD, December 1985. 被引量:1
  • 3BAUMANN A, BARHAM P, DAGAND P, et al. The Mul?tikernel: A New OS Architecture for Scalable Multicore Sys?tems [C]// Proceedings of the ACM SIGOPS 22nd Symposi?um on Operating Systems Principles: October 11-14,2009, Big Sky, Montana. ACM Press, 2009: 29-44. 被引量:1
  • 4TCG. TCG Specification Architecture Overview [S]. Trusted Computing Group. 被引量:1
  • 5ZHANG Shibin, XU Chunxiang, IDNG Yaxing. Study on Terminal Trusted Model Based on Trusted Computing [C]// Proceedings of 2011 International Conference on Internet Technology and Applications: August 16-18,2011, Wuhan, China. IEEE Press, 2011: 1-4. 被引量:1
  • 6ZHOU Hongwei, YUAN Jinhui. Formal Analysis of Trusted Computing: One Case Study [C]// Proceedings of 2011 3rd International Conference on Commmications and Mobile Computing: April 18-20, 2011, Qingdao, China. IEEE Press, 2011: 55-58. 被引量:1
  • 7NICK L. PErRONI J, TIMOTHY F, et al. Copilot-A Copro?cessor-Based Kernel Runtirre Integrity Monitor [C]// Pro?ceedings of the 13th Conference on USENIX Security Sym?posium: August, 2004, San Diego, CA. USENIX Association Berkeley 2004, 13: 13-24. 被引量:1
  • 8WANG Dan, Gill Xilan, FU Lihua. Dynamic Trust Measure?trent Model Based on Information Track Technology [C]// Proceedings of 2011 International Conference on Computer Science and Service System: June 27-29,2011, Nanjing Chi?na. IEEE Press, 2011: 3213-3216. 被引量:1
  • 9Gong Bei,Zhang Jianbiao,Shen Changxiang,Zhang Xing.Behavior Measurement Model Based on Prediction and Control of Trusted Network[J].China Communications,2012,9(5):117-128. 被引量:5
  • 10WIUlAM W, DAVID S, PASCALE P. The Sandbox for A?nalysis: Concepts and Methods [C]// Proceedings of ACM Proceedings of the SIGCHI Conference on Hunan Factors in computing systems: April, 2006. Montreal, Quebec, Can?ada. ACM Press, 2006: 801-810. 被引量:1

二级参考文献29

  • 1SHEN Changxiang, ZHANG Huanguo, WANG Huai-nfin. Research and Development of the Trusted Confuting[J]. Scientia Sinica(Infortmtions), 2010, 28(5): 139-166. 被引量:1
  • 2ZHANG Huanguo, LUO Jie, J1N Gang. Development of Trusted Computing Research. Journal of Wuhan University (Natural Science Edition), 2006, 5:513 - 518. 被引量:1
  • 3Trusted Computing Gaoup, TCG Specification Architecture Overview[EB/OL]. Revision 1.4, 2007. 被引量:1
  • 4TNC [EB/OL]. https :/Iwww. trustedcorqoutinggroup, org/ groups/network/. 被引量:1
  • 5RHEINGOLD H. The V'n'tual Conmmnity: Homesteading on the Electronic Frontier[M]. New York: Addison-Wesley, 2000. 被引量:1
  • 6COLWILLA C. Hunman Factors in Inforn mation Security: The Insider Threat-Who Can You Trust These Days? [J]. Infor- rr~tion Security Technical Report, 2009, 14(4): 186-196. 被引量:1
  • 7WANG Wei. Ceneralized Predictive Control Theory and Appfication[M]. Beijing: Science press, 1998. 被引量:1
  • 8DUSENBERY D. Living at MicroScale: The Unexpected Physics of Being Sn,all[M]. Harvard University Press, Cam- bridge, Mass, 2009. 被引量:1
  • 9LEI Yao. The Discussion of Hunman-Organization Behavior in Complex Systems. Journal of Tsinghua University (Phi- losophy and Social Sciences), 2000(5): 38-42. 被引量:1
  • 10RopertBrown. Croup Process [M]. Beijing: China Light In- dustry Press, 2007. 被引量:1

共引文献41

同被引文献1

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部