期刊文献+

基于进程的无干扰可信模型 被引量:28

Non-interference trusted model based on processes
下载PDF
导出
摘要 提出了一种适应于可信计算平台系统设计的抽象模型,该模型借鉴信息流的基本无干扰理论,利用进程代数和逻辑推理方法,将系统抽象为进程、动作、状态和输出,形式化地定义了进程运行可信,给出进程运行可信的条件和性质,推出进程运行可信隔离定理,在进程运行可信基础上给出系统运行可信的定义,并证明了系统运行可信判定定理。该模型建立在逻辑推理基础上,不依赖于特定的安全机制和实现方法,任何一种符合这个模型的实现方法,都可以达到系统运行可信的目标。 A novel abstract model for the design of trusted computing platform system was proposed. By using the basic idea of non-interference theory as reference and introduces the reasoning method of process algebra, thus abstracting the system as processes, actions, states and outputs, and giving the formal definition of the trusted of process running. Process isolation trusted theorem was verified formally. Furthermore, by associating process with system state, the defini- tion and the theorem of system running trusted was proposed. The model was established by logic reasoning and independent of special security mechanism and enforcement. The trust of the running system can be realized by any method which satisfies the conditions of the model.
出处 《通信学报》 EI CSCD 北大核心 2009年第3期6-11,共6页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311100) 国家高技术研究发展计划("863"计划)基金资助项目(2006AA01Z440) 北京市科技计划基金资助项目(Z07000100720706)~~
关键词 可信 无干扰 进程运行可信 系统运行可信 trusted non-interference process running trusted system running trusted
  • 相关文献

参考文献13

  • 1JФSANG A, KESER C, DIMITRAKOS T. Can we trust[A]. Proceedings of the Third International Conference on Trust 2005[C]. Springer Berlin / Heidelberg, 2005.93-107
  • 2PATEL J, TEACY W T L, JENNINGS N R, et al. A probabilistic trust model for handling inaccurate reputation sources, gust management[A]. Third International Conference, iTrust 2005[C]. Paris, France,2005. 193-209.
  • 3BETH T, BORCHERDING M, KLEIN B. Valuation of thust in open network[A]. Proceedings of the European Symposium on Research in Security(ESORICS)[C]. Brighton: Springer-Verlag, 1994. 3-18.
  • 4唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 5JФSANG A. An algebra for assessing trust in certification chains[A]. Proceedings of NDSS'99, Network and Distributed System Security Symposium, the Internet Society[C]. San Diego, 1999.
  • 6DYER J, LINDEMANN M, PEREZ R, et al. Building the IBM 4758 secure coprocessor[J]. IEEE Computer, 2001, 34(10): 57-66.
  • 7Trusted computing group, tcg specification architecture overview[EB/OL], https://www.trustedcomputinggroup.org/groups/TCG_ 1_2_Architecture_Overview.pdf.
  • 8Trusted computing group. TPM specification version 1.2. part 1 design principles[EB/OL].https://www.trustedcomputinggroup.org/specs/tpm/
  • 9JAEGER T, SAILER R, SHANKAR U. PRIMA: policy-reduced integrity measurement architecture[A]. Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006)[C]. 2006.
  • 10RUSHBY J. Noninterference, Transitivity, and Channel-Control Security Policies[R]. CSL-92-02, Menlo Park: Stanford Research Institute, 1992.

二级参考文献21

共引文献264

同被引文献282

引证文献28

二级引证文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部