期刊文献+

动态环境中的概率信息流安全 被引量:2

Probabilistic Information Flow Security in Dynamic Context
下载PDF
导出
摘要 在概率安全进程代数的基础上,研究了概率系统在动态环境中的信息流安全,以解决可动态配置的恶意进程对系统带来的危害.同时,提出了动态环境中的概率互拟复合不可演绎性质,即持久P-PBNDC.使用敌意环境下的弱概率互拟和动态敌意环境等概念讨论了P-PBNDC是概率系统在动态环境中合适的信息流安全性质,该性质能够揭露出概率互拟复合不可演绎性质(PBNDC)所不能暴露的潜在的安全隐患.最后,证明了P-PBNDC和SBSPNI性质的一致性,在限制算子和前缀算子下的P-PBNDC具有复合性质,而在并行算子下不具有复合性质. Based on probabilistic security process algebra, information flow security of probabilistic processes in dynamic context is investigated, which can eliminate the danger brought by malicious processes that can be configured dynamically, and the persistent probabilistic bisimulation nondeducibility on composition property in dynamic context, namely P PBNDC is presented. That P_ PBNDC is a proper information flow security property of probabilistic processes in dynamic context is discussed by using the notions of weak bisimulation in hostile contexts and dynamic context, which can expose the potential secure problem that PBNDC can not discover. Finally it is proved that P_ PBNDC is consistent with SBSPNI, and P_ PBNDC has composite property on the restriction and prefix operator but not on the parallel operator.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2006年第8期874-877,954,共5页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金重大研究计划资助项目(90104010) 国家自然科学基金资助项目(60241004) 国家重点基础研究发展计划资助项目(2003CB314801) 信息产业部国家242信息安全计划资助项目(2005C56)
关键词 信息流安全 进程代数 动态环境 information flow security process algebra dynamic context
  • 相关文献

参考文献9

  • 1Goguen J A,Meseguer J.Security policy and security models[C]∥ Proceedings of the 1982 Symposium on Security and Privacy.Los Alamitos,USA:IEEE Computer Society Press,1982:11-20.
  • 2Focardi R,Gorrieri R.A classification of security properties[J].Journal of Computer Security,1995,3(1):5-33.
  • 3Aldini A.Probabilistic information flow in a process algebra,UBLCS-2001-06[R].Bologna,Italy:University of Bologna,2001.
  • 4Aldini A,Bravetti M,Gorrieri R.A process-algebraic approach for the analysis of probabilistic noninterference[J].Journal of Computer Security,2004,12(2):191-245.
  • 5Aldini A,Bravetti M.An asynchronous calculus for generative-reactive probabilistic systems,UBLCS-2000-3[R].Bologna,Italy:University of Bologna,2000.
  • 6Focardi R,Rossi S.Information flow security in dynamic contexts[C]∥ Proceedings of 15th Computer Security Foundations Workshop.Los Angeles,USA:IEEE,2002:307-319.
  • 7Bossi A,Focardi R,Macedonio D,et al.A proof system for information flow security[C]∥ Proceedings of International Workshop on Logic Based Program Development and Transformation.Berlin:Springer,2002:199-218.
  • 8Bossi A,Focardi R,Macedonio D,et al.Verifying persistent security properties[J].Computer Languages,Systems and Structures,2004,30(3/4):231-258.
  • 9Bossi A,Focardi R,Macedonio D,et al.Unwinding in information flow security[J].Electronic Notes in Theoretical Computer Science,2004,99(6):127-154.

同被引文献9

  • 1薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 2赵保华,陈波,陆超.概率信息流安全属性分析[J].计算机学报,2006,29(8):1447-1452. 被引量:6
  • 3Fabrega F J T, Herzog J C, Guttman J D. Strand spaces: why is a security protocol correct? [C]//Proceedings of 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998: 160-171.
  • 4Dolev D, Yao A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.
  • 5Kao I L, Chow R. An efficient and secure authentication protocol using uncertified keys [J]. Operating Systems Review, 1995, 29(3) : 14-21.
  • 6Fabrega F J T, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2-3): 191-230.
  • 7Guttman J D, Fabrega F J T. Authentication tests[C]// Proceedings of 2000 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 2000: 96-109.
  • 8Meadows C. Formal methods for cryptographic protocols analysis: emerging issues and trends [J]. IEEE Journal on Selected Areas in Communications, 2003, 21(1): 44-54.
  • 9卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:118

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部