Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Chinese Journal of Computers》 2010-05
Add to Favorite Get Latest Update

An Extended Non-Interference Security Model(ENISM) and Its CSP-Based Description and Verification Method

CUI Jun HUANG Hao GAO Xiao-Chun(State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093) (Department of Computer Science and Technology,Nanjing University,Nanjing 210093)  
Based on the theory of non-interference,this paper proposes an extended non-interference security model ENISM,for the purpose of specification and analysis of information flow policies in operating systems.This paper includes the following works: firstly,system modules would be recognized as domains,and the traces set which contains traces may be implemented after a system state and the data values set at the state are two most important analysis gist for defining the secure states in ENISM.Secondly,the sufficient conditions ENISM-CC are proposed on which unsafe traces and data flow is not existed.Thirdly,this paper gives out a formal description method for system design and describes the semantic ENISM-CC based on the Communicating Sequential Processes CSP.
【Fund】: 国家“八六三”高技术研究发展计划项目基金(2007AA01Z409);; 国家自然科学基金(60473093)资助~~
【CateGory Index】: O242.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 MA Jianping; YU Xiangxuan; HONG Fan; ZHANG Jiangling(Department of Computer Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074 );A COMPLETE NONINTERFERENCE MODEL[J];Chinese Journal of Computers;1997-11
2 XIE Jun1+, HUANG Hao2 1(Institute of Command Automation, PLA University of Science and Technology, Nanjing 210007, China) 2(Department of Computer Science and Technology, Nanjing University, Nanjing 210093, China);A Noninterference Model for Nondeterministic Systems[J];Journal of Software;2006-07
Chinese Journal Full-text Database 4 Hits
1 SI Tian-ge,TAN Zhi-yong,LIU Duo,DAI Yi-qi (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);A Noninterference Model Based on Actions for Nondeterministic Systems[J];Acta Electronica Sinica;2008-11
2 CAO Ting,WANG Yan-xing(College of Computer,Beijing University of Technology,Beijing 100124,China);Research on Software Architecture of Food Safety Traceability System Based on Trust Computing[J];Computer Knowledge and Technology;2010-10
3 Qiu Gang1 Wang Yulei2 Zhang Xingang3 Deng Miaolei4(1 The CNIS Key Laboratory of the Education Ministry,Xidian University,Xi'an 710071,China;2 Network Information Center,Nanyang Institute of Technology,Nanyang 473004,Henan China;3 College of Computer and Information Technology,Nanyang Normal Universuity,Nanyang 473061,Henan China;4 Institute of Science,PLA Information Engineering University,Zhengzhou 450001,China);Information flow-based integrity protection model[J];Journal of Huazhong University of Science and Technology(Natural Science Edition);2010-12
4 QIU Gang1,WANG Yu-lei2,ZHOU Li-hua1 ( 1. The CNIS Key Lab. of the Education Ministry,Xidian Univ. ,Xi’an 710071,China; 2. Network Info. Center,Nanyang Inst. of Technol. ,Nanyang 473004,China);Noninterference-based Integrity Measurement Model[J];Journal of Sichuan University(Engineering Science Edition);2010-04
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 LIANG Hong-Liang+, SUN Yu-Fang, ZHAO Qing-Song, ZHANG Xiang-Feng, SUN Bo (Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China);Design and Implementation of a Security Label Common Framework[J];Journal of Software;2003-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved