A Noninterference Model for Nondeterministic Systems
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [12]
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    The noninterference concept for actions of system to information domains is proposed. On the basis of this concept, the noninterference model is extended to nondeterministic systems. The noninterference concept based on actions of system simplifies the “purge” of the action sequence of the system. As a result, this model has concise unwinding conditions which are easy to understand and use. The extended model can be used to verify not only static but also dynamic information flow policies. Finally, a dynamic label based access control model is designed, in which the concrete semantic of the actions such as read, write and execute are defined, and its security is verified by the noninterference model.

    Reference
    [1]Peri RV.Specification and verification of security policies[Ph.D.Thesis].Virginia:University of Virginia,1996.
    [2]Goguen J,Meseguer J.Security policies and security models.In:Proc.of the 1982 IEEE Symp.on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,1982.11-20.http://doi.ieeecomputersociety.org/10.1109/SP.1982.10014
    [3]Rushby J.Noninterference,transitivity,and channel-control security policies.Technical Report,CSL-92-02,Menlo Park:Stanford Research Institute,1992.
    [4]Zheng L,Myers AC.Dynamic security labels and noninterference.In:Dimitrakos T,Martinelli F,eds.Proc.of the 2nd Int'l Workshop on Formal Aspects in Security and Trust (FAST).Toulouse:Springer-Verlag,2004.27-40.
    [5]Sabelfeld A,Myers AC.Language-Based information-flow security.IEEE Journal on Selected Areas in Communications,2003,21(1):1-15.
    [6]Hicks M,Tse S,Hicks B,Zdancewic S.Dynamic updating of information-flow policies.In:Sabelfeld A,ed.Proc.of the Int'l Workshop on Foundations of Computer Security (FCS).Chicago,2005.7-18.http://www.cs.chalmers.se/~andrei/FCS05/fcs05.pdf
    [7]Ryan P,McLean J,Millen J,Gligor V.Non-Interference,who needs it? In:Proc.of the 14th IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,2001.237-241.http://csdl.computer.org/comp/proceedings/csfw/2001/1146/00/11460237.pdf
    [8]Mantel H.Unwinding possibilistic security properties.In:Cuppens F,Deswarte Y,Gollmann D,Waidner M,eds.Proc.of the 6th European Symp.on Research in Computer Security (ESORICS 2000).Toulouse:Springer-Verlag,2000.238-254.
    [9]McLean J.Security models.In:Marciniak JJ,ed.Encyclopedia of Software Engineering.New York:John Wiley & Sons,1994.http://www.cs.pomona.edu/classes/cs 190/Spapers/4-mclean94security.pdf
    [10]Zakinthinos A,Lee ES.A general theory of security properties.In:Proc.of the 1997 IEEE Symp.on Security and Privacy.Los Alamitos:IEEE Computer Society Press,1997.94-102.http://doi.ieeecomputersociety.org/10.1109/SECPRI.1997.601322
    [11]Liang HL,Sun YF,Zhao QS,Zhang XF,Sun B.Design and implementation of a security label common framework.Journal of Software,2003,14(3):547-552 (in Chinese with English abstract).Http://www.jos.org.cn/1000-9825/14/547.htm
    [11]梁洪亮,孙玉芳,赵庆松,张相锋,孙波.一个安全标记公共框架的设计与实现.软件学报,2003,14(3):547-552.http://www.jos.org.cn/1000-9825/14/547.htm
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

谢钧,黄皓.一个非确定系统的不干扰模型.软件学报,2006,17(7):1601-1608

Copy
Share
Article Metrics
  • Abstract:4232
  • PDF: 5084
  • HTML: 0
  • Cited by: 0
History
  • Received:August 22,2004
  • Revised:August 22,2004
You are the first2034822Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063