检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:吕从东 LV Congdong(Center of Chinese Auditing Intelligence,Nanjing Audit University,Nanjing 211815,China)
机构地区:[1]南京审计大学中国审计情报中心,南京211815
出 处:《计算机工程与应用》2018年第8期78-84,共7页Computer Engineering and Applications
基 金:江苏省高等学校自然科学研究项目(No.17KJD520005);南京审计大学人才引进项目
摘 要:IP安全适用于非传递策略的无干扰模型。但是,满足IP安全的系统中仍然存在类似于动作先后顺序这样的信息,因此,提出了新的无干扰模型TA安全。对非传递无干扰下IP安全和TA安全进行比较分析,给出函数ipurge与函数ta的差别条件,函数ta隐藏了动作序列中部分动作的先后顺序,这些动作的先后顺序对于安全域是一种额外的信息。然后,使用该差别条件,提出当系统满足IP安全时,使系统满足TA安全所需要的条件并进行形式化推导。IP-secure is proposed for intransitive policies.But the definitions of IP-secure for intransitive policies in these works suffer from some subtle flaws,such as the orders of the actions,and an altered definition called TA-secure is proposed.This paper analyzes IP-secure and TA-secure and tries to find the difference between them.It finds the conditions to exchange the order of two actions in a sequence,where the results are equal after executing function ipurge.It also finds the conditions to exchange the order of two actions in a sequence,where the results are equal after executing function ta.Then,it compares the conditions to find the difference.The exact condition when function ta can purge the orders of the actions which shouldn’t be known by the security domain is found.Based on the difference,it gives the requirement to make a system satisfy TA-secure when it is IP-secure.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.249