高级检索

    王精明1,2, 虞慧群1. 基于安全进程代数的信息流安全模型的分析与验证[J]. 华东理工大学学报(自然科学版), 2012, (1): 102-106.
    引用本文: 王精明1,2, 虞慧群1. 基于安全进程代数的信息流安全模型的分析与验证[J]. 华东理工大学学报(自然科学版), 2012, (1): 102-106.
    WANG Jing-ming1,2,, YU Hui-qun1. Security Process AlgebraBased Analysis and Verification of Information Flow Security Model[J]. Journal of East China University of Science and Technology, 2012, (1): 102-106.
    Citation: WANG Jing-ming1,2,, YU Hui-qun1. Security Process AlgebraBased Analysis and Verification of Information Flow Security Model[J]. Journal of East China University of Science and Technology, 2012, (1): 102-106.

    基于安全进程代数的信息流安全模型的分析与验证

    Security Process AlgebraBased Analysis and Verification of Information Flow Security Model

    • 摘要: 基于信息流的安全模型相对于基于访问控制的安全模型就刻画安全的性质而言更为本质。在安全进程代数统一框架下描述并形式化定义6种信息流安全模型,并且基于迹语义分析其逻辑蕴含关系,进一步对基于安全进程代数的6种信息流安全模型给出验证算法,并开发出验证工具,最后通过实例说明了该验证工具的使用。

       

      Abstract: In characterizing security, the information flow security models capture more essence than the access control security models. Within the unified framework of security process algebra, this paper describes and formally defines six types of information flow security models and analyzes their relationship of logical implication based on trace semantics. Furthermore, both the verification algorithm and the verification tools are developed for the six information flow security models based on security process algebra. Finally, several examples are presented for their utilization.

       

    /

    返回文章
    返回