首页> 外文会议>Information Reuse and Integration, 2007 IEEE International Conference on >Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture
【24h】

Using Policy Enforcement Graphs in a Separation-Based High Assurance Architecture

机译:在基于分离的高保证体系结构中使用策略执行图

获取原文
获取原文并翻译 | 示例

摘要

As the use of computer systems becomes more commonly employed, managing security becomes more complex. One fundamental key to effective enforcement of security standards is the support of security policies. We present a novel graph-based approach to the specification of security policies and verification of designs that enforce the policies. This methodology provides system security managers with a procedural engineering approach that will ensure that security policy enforcement is addressed during the process of refining of the high-level system design down to a low-level implementation. We present an inter-enclave multi-policy paradigm using Policy Enforcement Graphs for information access of the Multiple Independent Levels of Security and Safety (MILS) approach to high assurance system design for security-and safety-critical multi-enclave systems. Our methodology is structured and allows for policy evolution development.
机译:随着计算机系统的使用变得越来越普遍,安全性管理也变得越来越复杂。有效执行安全标准的基本关键之一是对安全策略的支持。我们提出了一种基于图的新颖方法来规范安全策略并验证实施策略的设计。这种方法为系统安全管理人员提供了一种程序工程方法,可确保在从高级系统设计到低级实施的细化过程中解决安全策略的强制实施问题。我们提出了一种使用策略执行图的安全区域间多策略范式,用于安全性和安全性至关重要的多安全区域系统的多重独立级别的安全性和安全性(MILS)方法的信息访问,以确保系统的高度保证。我们的方法是结构化的,并允许制定政策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号