• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Si Tiange, Tan Zhiyong, and Dai Yiqi. A Security Proof Method for Multilevel Security Models[J]. Journal of Computer Research and Development, 2008, 45(10): 1711-1717.
Citation: Si Tiange, Tan Zhiyong, and Dai Yiqi. A Security Proof Method for Multilevel Security Models[J]. Journal of Computer Research and Development, 2008, 45(10): 1711-1717.

A Security Proof Method for Multilevel Security Models

More Information
  • Published Date: October 14, 2008
  • Some variants of BLP model can not prove whether their security policies match multilevel security requirements due to the limitation of security proof method of BLP model. It is pointed out that basic security theorem can only show whether a model match its security properties. So it is necessary to find a new way to formally analyze the improved BLP models instead of using basic security theorem as the original BLP, especially when the security of their improved rules is too complicated to judge directly or when the definition of security properties has been modified, which is considered as the reasoning basics of basic security theorem. In order to accomplish this, a security proof method is developed which takes advantages of a new noninterference model and provides a way to prove the security of multilevel security models from the point of view of information flow. The new noninterference model reclaims the definition of transitive noninterference relationship between system actions, presents a new unwinding theorem, and offers a great help in expressing dynamic policies of multilevel security models. To show practicability of the new noninterference model and the formal method, the security properties of ABLP and DBLP models are examined as examples.
  • Related Articles

    [1]Zhai Ennan, Cao Jiamin, Qian Kun, Guan Yu. Towards Network Infrastructure Research for the Era of Large Language Models: Challenges, Practices, and Prospects[J]. Journal of Computer Research and Development, 2024, 61(11): 2664-2677. DOI: 10.7544/issn1000-1239.202440576
    [2]Wang Ting, Liu Gang. Software Defined Virtualized Access Network Supporting Network Slicing and Green Communication[J]. Journal of Computer Research and Development, 2021, 58(6): 1291-1306. DOI: 10.7544/issn1000-1239.2021.20201079
    [3]Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong. Delay-Aware Resource Scheduling Optimization in Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747. DOI: 10.7544/issn1000-1239.2018.20170926
    [4]Wang Junxiao, Qi Heng, Li Keqiu, Zhou Xiaobo. Real-Time Link Fault Detection as a Service for Datacenter Network[J]. Journal of Computer Research and Development, 2018, 55(4): 704-716. DOI: 10.7544/issn1000-1239.2018.20170941
    [5]Zhou Weilin, Yang Yuan, Xu Mingwei. Network Function Virtualization Technology Research[J]. Journal of Computer Research and Development, 2018, 55(4): 675-688. DOI: 10.7544/issn1000-1239.2018.20170937
    [6]Deng Xiaoheng, Cao Dejuan, Pan Yan, Shen Hailan, Chen Zhigang. An Optimized Credit Distribution Model in Social Networks with Time-Delay Constraint[J]. Journal of Computer Research and Development, 2017, 54(2): 382-393. DOI: 10.7544/issn1000-1239.2017.20151118
    [7]Wang Cong, Yuan Ying, Peng Sancheng, Wang Xingwei, Wang Cuirong, Wan Cong. Fair Virtual Network Embedding Algorithm with Topology Pre-Configuration[J]. Journal of Computer Research and Development, 2017, 54(1): 212-220. DOI: 10.7544/issn1000-1239.2017.20150785
    [8]Li Jianzhong and Gao Hong. Survey on Sensor Network Research[J]. Journal of Computer Research and Development, 2008, 45(1): 1-15.
    [9]Cai Zhiping, Yin Jianping, Liu Xianghui, Liu Fang, and Lü Shaohe. A Distributed Network Monitoring Model with Link Constraint[J]. Journal of Computer Research and Development, 2006, 43(4): 601-606.
    [10]Yang Peng and Wu Jiagao. Research on Network Service Architecture and Its Formal Model[J]. Journal of Computer Research and Development, 2005, 42(7): 1115-1122.

Catalog

    Article views (837) PDF downloads (543) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return