检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]上海交通大学信息安全工程学院,上海200240
出 处:《计算机学报》2006年第8期1460-1467,共8页Chinese Journal of Computers
摘 要:安全系统中的隐含信息流对系统保密特性构成了严重威胁,对安全系统进行相应的信息流分析是发现隐含信息流的最有效方法.以往的信息流分析主要基于事件轨迹模型进行,不易在系统安全实践中得到利用.该文把安全系统及安全策略模型化为有限自动机,通过研究有限自动机的特性来分析安全系统的信息流特性,进而确定出系统中是否存在隐含信息流.自动机模型比轨迹模型更为直观和自然地表述系统安全策略,在实际系统中能更好地得到应用.Confidentiality is an important security requirement in many secure systems. However, access control mechanisms can't completely make sure that confidential information never leaks out, because the mechanisms cannot prevent hidden information flow and confidential information can stealthily leak out. The authors outline a state-based approach to deciding whether hidden information flows exist. The main idea of the approach is to model secure systems as finite automata, and analyze the properties of information flow by studying the characteristic of the finite automata. Compared with the past works, the research is completely based on automaton model. Security policies in actual secure systems are usually described in automaton model or action rules convenient to be transformed into automaton model. Thus the results are more suitable to be directly used in actual systems. In addition, subsequent research following the works, such as eliminating hidden information flow, can easily go on.
关 键 词:安全操作系统 隐含信息流 隐蔽信道 有限自动机 保密性
分 类 号:TP316[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15