Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Chinese Journal of Computers》 1997-11
Add to Favorite Get Latest Update

A COMPLETE NONINTERFERENCE MODEL

MA Jianping; YU Xiangxuan; HONG Fan; ZHANG Jiangling(Department of Computer Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074 )  
A new concept of noninterference based on subject's actions and views is presented in this paper, and then a complete secure information flow model based on the new concept is described. In the model, operations of computer systems are assumed to have only two access modes, i. e. read and write, therefore two state transition rules of systems are defined according to these modes. The proof about security of the model is given finally. This model has two significant features: it can be used to analyze security of systems, and it is able to support multiple security policies.
【Fund】: 国家自然科学基金
【CateGory Index】: TP301
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 CAO Ting,WANG Yan-xing(College of Computer,Beijing University of Technology,Beijing 100124,China);Research on Software Architecture of Food Safety Traceability System Based on Trust Computing[J];Computer Knowledge and Technology;2010-10
2 CUI Jun HUANG Hao GAO Xiao-Chun(State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093) (Department of Computer Science and Technology,Nanjing University,Nanjing 210093);An Extended Non-Interference Security Model(ENISM) and Its CSP-Based Description and Verification Method[J];Chinese Journal of Computers;2010-05
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Li Jun and Sun Yufang(Institute of Software,Chinese Academy of Sciences,Beijing 100080);COMPUTER SECURITY AND SECURITY MODEL[J];JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT;1996-04
2 TAN Liang1,2 XU Zhi-wei1(Institute of Computing Technology,Chinese Academy of Sciences,Beijing100080,China)1(College of Computer,Sichuan Normal University,Chengdu 610066,China)2;Development of the Transitive Trusted Chain Based on TPM[J];Computer Science;2008-10
3 LUO Jun,CHEN Hongsheng(School of Electronic Science and Engineering,National University of Defense Technology,Changsha 410073);A Model of Security on “Resource” for Network OA[J];Computer Engineering;2006-12
4 YUAN Xiao Dong 1) FENG Ying 2) 1) (Oracle Metro iService, NY 11421, USA) 2) (Department of Computer Science, Indiana University, IN 47405, USA);The Model of Mandatory Access Control with Extended Security Label[J];CHINESE JOURNAL OF COMPUTERS;2000-10
5 LIU Yun Sheng QIN Biao LI Guo Hui YANG Jin Cai (College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074);A Commit Protocol in Distributed Real-Time Databases[J];Chinese Journal of Computers;2002-02
6 CAI Yi ZHENG Zhi-Rong SHEN Chang-Xiang (Computing Technology Research Institute of Navy, Beijing 100841);A Planar Attributes Model Based on Multi Level Security Policy[J];Chinese Journal of Computers;2004-05
7 LIANG Wen;Active Databases & Their Research Status[J];Information Studies: Theory & Application;2001-02
8 WANG Teng-jiao; WANG Hai-yang; HONG Xiao-guang; DONG Ji-run(DePartment of Computer Science and Technology Beljing University Beijing 100871 )(Department of COmputer Science Shandong University Ji'nan 250100);A Three-stage Model of Incremental Maintenance of Multi-materialized Views[J];JOURNAL OF SOFTWARE;1999-11
9 GONG Zhi guo 1 ZHOU Long xiang 2 DONG Shu zhen 3 1(Object Technology Center Institute of Software The Chinese Academy of Sciences Beijing 100080) 2(Institute of Mathematics The Chinese Academy of Sciences Beijing 100080);Distributed Multimedia Database Systems[J];JOURNAL OF SOFTWARE;2000-01
10 LI Li-xin CHEN Wei-min HUANG Shang-lian(Smart Structure Center\ Chongqing University\ Chongqing\ 400044);Realizing Mandatory Access Control in Role-Based Security System[J];JOURNAL OF SOFTWARE;2000-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved