期刊文献+

基于规则推导的特权隐式授权分析 被引量:3

Analysis on Implicit Authorization in Privilege Through Rule Deduction
下载PDF
导出
摘要 介绍了一种研究系统特权安全问题的方法.由于其特有的迁移系统安全状态的能力,使得分析及保护系统特权都很困难,因此,传统访问控制研究中所采用的技术无法复制到该领域.在访问控制空间理论下,检查了系统特权的来源问题及其特点,从而将系统规则划分为约束规则与执行规则两类,分别描述授权的限制与效果.进一步对规则逻辑形式进行推导,发现特权操作问的特殊授权关系以及相关属性,并设计了一种快速构造授权推导图的算法.在此基础上,分析隐式授权安全问题可能存在的滥用特权威胁.最后对POSIX(portable operating system interface)标准的权能机制进行形式化描述,计算并构造其授权推导图.对标准设计中存在的滥用威胁提供了对策,有效地实现了与最小特权原则的一致性. A scheme on studying the safety issues for privilege in systems is introduced. Since the particular faculty of transiting security states makes analyzing and protecting privilege for a system difficult, techniques used in traditional access control should not copy to this field. For this reason the features are firstly inspected by discussing the origination of privilege using access control space theory. Then rules defined for a system could be divided into two categories: constraint rules and execution rules, describing the restrictions and effect of an authorization respectively. Furthermore, a special authorization relation between different privilege operations, as well as its properties, is investigated against rules' logical patterns by deduction. A quick algorithm for constructing authorization deduction graph is also provided. Basing on it, common safety issue of implicit authorization was reviewed with the possibility to be abused. Finally this paper formalizes the capability mechanism defined by POSIX (portable operating system interface) standard, constructing ADG (authorization deduction graph) for it. Thedesign is revised with countermeasures against privilege abusing so as to preserve consistent with the principle of least privilege.
出处 《软件学报》 EI CSCD 北大核心 2008年第8期2102-2113,共12页 Journal of Software
基金 国家自然科学基金No.60573042 国家重点基础研究发展计划(973)No.G1999035802 北京市自然科学基金No.4052016~~
关键词 特权 约束规则 执行规则 推导 隐式授权 privilege constraint rule execution rule deduction implicit authorization
  • 相关文献

参考文献12

  • 1Ji QG, Qing SH, He YP. A new formal model for privilege control with supporting POSIX capability mechanism. Science in China (Series E), 2004,34(6):683-700 (in Chinese with English abstract)..
  • 2Saltzer JH, Schroeder MD. The protection of information in computer systems. In: Trew JR, Calder J, eds, Proc, of the IEEE, Vol.63, New York: IEEE, Inc,, 1975, 1278-1308.
  • 3Schneider FB. Least privilege and more. IEEE Security& Privacy, 2003,I(5):55-59.
  • 4Portable Applications Standards Committee of the IEEE Computer Society. Standards Project, Draft Standard for Information Technology-Portable Operating System Interface (POSIX), PSSG Draft 17. New York: IEEE, Inc., 1997.
  • 5Data General. Managing security on DG/UX system. Manual 093701138-09, Westboro: Data General, A Division of EMC Corporation, 2001.
  • 6Liang B. Research on trusted process mechanism and related problems [Ph.D. Thesis]. Beijing: Institute of Software, the Chinese Academy of Sciences, 2004.31-101 (in Chinese with English abstract).
  • 7Jaeger T, Zhang XL. Policy management using access control spaces. ACM Trans. on Information and System Security, 2003,6(3): 327-364.
  • 8Bertino E, Catania B, Ferrari E, Perlasca P. A logical framework for reasoning about access control models. ACM Trans. on Information and System Security, 2003,6(1):71-127.
  • 9Harrison MA, Ruzzo WL, Ullman JD. Protection in operating systems. Communications of the ACM, 1976,19(8):461-471.
  • 10Rabbiti F, Bertino E, Kim W, Woelk D. A model of authorization for next-generation database systems. ACM Trans. of Database Systems, 1991,16(1):88-131.

同被引文献30

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 2李暾,屈婉霞,郭阳,刘功杰,李思昆.基于符号模拟和约束逻辑编程的RTL级Verilog谓词抽象方法[J].计算机学报,2007,30(7):1138-1144. 被引量:1
  • 3Reith M, Niu Jian-wei, Winborough W. Apply Model Checking to Security Analysis in Trust Management[C]//lEEE 23rd International Conference on Data Engineering. 2007:734-743.
  • 4Sandhu R S. The Typed Access Matrix Model[C]//IEEE Symposium on Research in Security and Privacy. 1992:122-136.
  • 5Bertino E, Kan L R, Sandhu R, et al. Secure Knowledge Management..Confidentiality,Trust,and Privacy[J]. IEEE Transaction on Systems, Man, and Cybernetics, Part A, 2006,36(3) : 429-438.
  • 6Park J, Sandhu R. The UCONABC Usage Control Model [J]. ACM Transactions on Information and System Security,2004,7 (1) :128-174.
  • 7Zhang Xin-wen, Parisi-Presicce F, Sandhu R, et al. Formal Model and Policy Specification of Usage Control [J]. ACM Transactions on Information and System Security, 2005,8(4) : 351-387.
  • 8Wang D. SAT-based abstraction refinement for hardware verification[D]. Pittsburgh.- Carnegie Mellon University, 2003.
  • 9Wu Q, Hsiao M S. A new simulation-based property checking algorithm based on partitioned alternative Search Space Traversal[J]. IEEE Transactions on Computers, 2006, 55 (11): 1325-1334.
  • 10Graf S, Saidi H. Construction of abstract state graphs with PVS [C]//LNCS 1524. Haifa, 1997 : 72-83.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部