首页> 外文会议>Information and Communications Security >A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems
【24h】

A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems

机译:在操作系统中实现的信息流安全策略的安全验证方法

获取原文

摘要

Nowadays, operating system security depends much on the security policies implemented in the system. It's necessary to verify whether the secure operating system's implementation of security policies is correct. The paper provides a general and automaticable security verification method which is suitable for deploying in practice to verify information flow security policies implemented in information systems specially in secure operating systems. We first use information flow graphs (IFG) to express the information flow security policies specified by temporal logic. Then, based on the express method, we supply a verification framework to verify whether the implementation of an information system satisfies the restrictions of security policies. At last, a security verification framework based on mandatory access control (MAC) which is fit for current secure operating systems has been given.
机译:如今,操作系统的安全性在很大程度上取决于系统中实施的安全性策略。有必要验证安全操作系统的安全策略实施是否正确。本文提供了一种通用且可自动执行的安全性验证方法,该方法适合在实践中部署以验证在信息系统中(特别是在安全操作系统中)实施的信息流安全性策略。我们首先使用信息流图(IFG)来表示由时间逻辑指定的信息流安全策略。然后,基于快速方法,我们提供了一个验证框架,以验证信息系统的实现是否满足安全策略的限制。最后,给出了适用于当前安全操作系统的基于强制访问控制(MAC)的安全验证框架。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号