首页> 外文学位 >Formal approaches for specifying, enforcing, and verifying security policies.
【24h】

Formal approaches for specifying, enforcing, and verifying security policies.

机译:用于指定,执行和验证安全策略的正式方法。

获取原文
获取原文并翻译 | 示例

摘要

Each organization or company, having its own purposes and goals for its projects, needs to establish security policies for various reasons: information protection, regulations, contracts, and legal issues. The process of establishing security policies is more important than the document itself and the purpose of these policies is to ensure that the final result actually provides a secure service. Most approaches for enforcing and verifying security policies fall short of the goal due to the use of informal specifications that might lead to ambiguity, inconsistency, and incompleteness. Due to the ambiguity and imprecision of informal specification, it is difficult to verify the correctness of the system.; This research presents a framework for formally specifying, enforcing, and verifying security policies. A security policy is specified as predicate logic formulas on a set of executions based on grouping finite sets of classes, entities, relations, atomic predicate formulas, and some auxiliary elements that help to build predicate formulas. The enforcement approach is called Security State Machines (SSMs), and it helps to formally enforce and verify computer security polices. Using Security State Machines is a flexible technique that can enforce a collection of security policies. They have a set of states and rules for making transitions from one state to another. The transitions between states are directed by the actual policy being enforced. The enforcement technique works by allowing any execution that satisfies the security policy and terminating any execution that violates it.; Security policies enforced by SSMs can be verified using different models. In this research we use one of the famous models of verification called CTL model checking. Model checking is one of the recent methods of formal verification that has been applied in computer security, specifically in network protocols verification, to discover the security flaws. CTL model checking allows us to formally examine the properties of existing and novel security architectures through relatively simple methods that allow a high degree of automation.
机译:每个组织或公司都有自己的项目目的和目标,出于各种原因,它们需要建立安全策略:信息保护,法规,合同和法律问题。建立安全策略的过程比文档本身更重要,这些策略的目的是确保最终结果实际上提供了安全的服务。由于使用非正式规范可能会导致歧义,不一致和不完整,因此大多数执行和验证安全策略的方法均未达到目标。由于非正式规范的模糊性和不精确性,很难验证系统的正确性。这项研究提出了一个框架,用于正式指定,执行和验证安全策略。在将一组有限的类,实体,关系,原子谓词公式和一些有助于构建谓词公式的辅助元素进行分组的基础上,将安全策略指定为一组执行中的谓词逻辑公式。强制执行方法称为安全状态机(SSM),它有助于正式执行和验证计算机安全策略。使用安全状态机是一种灵活的技术,可以强制执行一系列安全策略。它们具有一组状态和规则,用于从一个状态过渡到另一个状态。状态之间的转换由所执行的实际策略指示。强制技术的工作方式是允许任何满足安全策略的执行并终止违反安全策略的执行。可以使用不同的模型来验证SSM实施的安全策略。在这项研究中,我们使用了一种著名的验证模型,称为CTL模型检查。模型检查是形式验证的最新方法之一,已应用于计算机安全(特别是网络协议验证)中,以发现安全漏洞。 CTL模型检查使我们可以通过允许高度自动化的相对简单的方法,正式检查现有和新颖的安全体系结构的属性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号