Decentralized Information Flow Controlled Method Based on Trusted Pipe

Article Preview

Abstract:

To solve the problems derived from isolation of application security mechanism and operation system security mechanism, firstly we propose the concept of trusted pipe, which can be used to achieve a uniform security mechanism, and then formally describe the information flow control method in the Communicating Sequential Processes(CSP). Finally we prove that the model fits a standard definition of non-interference.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

763-768

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Bishop, M. Computer Security: Art and Science, Addison Wesley. (2003).

Google Scholar

[2] Depart ment of Defense trusted computer system evaluation criteria, DoD 5200. 28-STD. In the glossary under entry Trusted Computing Base (TCB). (1985).

Google Scholar

[3] Bell, D.E. and LaPadula, LJ. Secure Computer Systems: Unified Exposition and Multics Interpretation. MITRE Corporation, MTR-2997. (1976).

Google Scholar

[4] Elliott I. Organick, The Multics System: An Examination of Its Structure, The MIT Press. (1972).

Google Scholar

[5] Trusted Computing Group http: /www. trustedcomputinggroup. org.

Google Scholar

[6] C. A. R. Hoare,Communicating Sequential Processes. Englewood Cliffs, New Jersey: Prentice/Hall International (1985).

Google Scholar

[7] M. Krohn, E. Tromer,Non-interference for a Practical DIFC-Based Operating System. In 2009 IEEE Symposium on Security and Privacy, IEEE Computer Society,Oakland,CA. (2009).

DOI: 10.1109/sp.2009.23

Google Scholar

[8] J. A. Goguen and J. Meseguer. Security policies and security models. In IEEE Symposium on Research in Security and Privacy (1982).

DOI: 10.1109/sp.1982.10014

Google Scholar

[9] Peter A. Ryan and Steve A. Schneider. Process algebra and non-interference. Journal of Computer Security, (9): 75–103. (2001).

Google Scholar