首页 | 官方网站   微博 | 高级检索  
     

基于广义污点传播模型的操作系统访问控制
引用本文:杨智,殷丽华,段洣毅,吴金宇,金舒原,郭莉.基于广义污点传播模型的操作系统访问控制[J].软件学报,2012,23(6):1602-1619.
作者姓名:杨智  殷丽华  段洣毅  吴金宇  金舒原  郭莉
作者单位:1. 中国科学院计算技术研究所,北京 100190;解放军信息工程大学,河南郑州450004;中国科学院研究生院,北京 100049;信息内容安全技术国家工程实验室,北京100190
2. 中国科学院计算技术研究所,北京 100190;信息内容安全技术国家工程实验室,北京100190
3. 中国科学院计算技术研究所,北京,100190
基金项目:国家自然科学基金,国家高技术研究发展计划(863),国家重点基础研究发展计划(973)
摘    要:动态调整安全级是目前提高强制访问控制模型可用性的主要途径,它大致包括两类方法.其中,安全级范围方法对主体权限最小化的支持不够,而污点传播方法存在已知隐蔽通道.提出了保护操作系统保密性和完整性的广义污点传播模型(generalized taint propagation model,简称GTPM),它继承了污点传播在最小权限方面的特点,拓展了污点传播语义,以试图关闭已知隐蔽通道,引入了主体的降密和去污能力以应对污点积累;还利用通信顺序进程(CSP)语言描述了模型的规格,以明确基于GTPM的操作系统的信息流控制行为的形式化语义;基于CSP的进程等价验证模型定义了可降密无干扰,并借助FDR工具证明形式化构建的抽象GTPM系统具有可降密无干扰安全性质.最后,通过一个示例分析了模型的可用性提升.

关 键 词:污点传播  隐蔽通道  通信顺序进程  无干扰  最小权限  信息流控制  操作系统
收稿时间:2010/10/18 0:00:00
修稿时间:2011/4/28 0:00:00

Generalized Taint Propagation Model for Access Control in Operation Systems
YANG Zhi,YIN Li-Hu,DUAN Mi-Yi,WU Jin-Yu,JIN Shu-Yuan and GUO Li.Generalized Taint Propagation Model for Access Control in Operation Systems[J].Journal of Software,2012,23(6):1602-1619.
Authors:YANG Zhi  YIN Li-Hu  DUAN Mi-Yi  WU Jin-Yu  JIN Shu-Yuan and GUO Li
Affiliation:1,4 1(Institute of Computing Technology,The Chinese Academy of Sciences,Beijing 100190,China) 2(Information Engineering University of PLA,Zhengzhou 450004,China) 3(Graduate University,The Chinese Academy of Sciences,Beijing 100049,China) 4(National Engineering Laboratory for Information Security Technologies,Beijing 100190,China)
Abstract:Dynamically adjusting the security label of each subject is a main approach to improving the availability of MAC models.It includes the method of security label range and the method of taint propagation.The former lacks the support for a less proviledge subject,and the latter has a known covert channels.In this paper,a model called generalized taint propagation model(GTPM) is proposed to protect the confidentiality and integrity of operating systems.It inherits the least privilege characteristic of taint propagation model(TPM),expands the semantics of TPM to close the known covert channels,and introduces declassification and decontamination capacities of subjects to avoid accumulating contamination.The paper also introduces its specification using communicating sequential processes(CSP) language to clear the formal semantics of a GTPM operating system’s behaviors of information flow control;Moreover,the study noninterference with declassification in CSP verification model of process equivalence,and proves that abstract GTPM system have the security property of noninterference with declassification in virtue of FDR tool.Finally,this paper uses an example to demonstrate its improvement of availability.
Keywords:taint propagation  covert channel  CSP  noninterference  least privilege  information flow control  operating system
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号