首页 | 本学科首页   官方微博 | 高级检索  
     

基于污点标记的访问控制模型及其安卓实现
引用本文:吴泽智,陈性元,杨 智,杜学绘.基于污点标记的访问控制模型及其安卓实现[J].计算机应用,2014,34(2):473-476.
作者姓名:吴泽智  陈性元  杨 智  杜学绘
作者单位:1. 信息工程大学 密码工程学院,郑州 4500012. 信息工程大学 网络空间安全学院,郑州 450001
基金项目:国家973计划项目;国家863计划项目;河南省科技创新人才计划项目
摘    要:为保护移动操作系统平台中存储的用户隐私数据,提出一个基于污点标记的访问控制(TBAC)模型,并设计了一个基于污点跟踪的信息流控制框架(TIFC)。为数据添加污点标记,控制力度细化到数据;引入主体能力保证最小特权原则;主体能力独立于数据污染与可信去污防止污点积累。该模型与BLP模型相比更加可用、灵活与细粒度。该框架能细粒度地、灵活地、准确地实时跟踪并控制隐私信息的流向,并解决了程序执行中因控制流产生的隐蔽通道问题。

关 键 词:安卓  隐私安全  访问控制  污点跟踪  隐蔽通道  
收稿时间:2013-07-02
修稿时间:2013-09-04

Taint-marking based access control model and its implementation on Android
WU Zezhi XHEN Xingyuan YANG Zhi DU Xuehui.Taint-marking based access control model and its implementation on Android[J].journal of Computer Applications,2014,34(2):473-476.
Authors:WU Zezhi XHEN Xingyuan YANG Zhi DU Xuehui
Affiliation:1. College of Cryptogram Engineering, Information Engineering University, Zhengzhou Henan 450001, China;2. College of Network Space Security, Information Engineering University, Zhengzhou Henan 450001, China
Abstract:For protecting the sensitive data on mobile operation system, a Taint-marking Based Access Control (TBAC) model was presented and a Taint-marking Information Flow Control (TIFC) framework was proposed. To improve fine-grained data sharing, labels were designed for each data. To support for least privilege characteristic, capacities were defined to each subject. To avoid accumulating of contamination, decontamination capacities of trust subjects were introduced. Compared with BLP, TBAC is more available, flexible and fine-grained. The results show TIFC is an effective, flexible and accurate framework in tracking and controlling the information flow at runtime, and TIFC solves the problem of covert channel caused by control flow during program execution.
Keywords:Android                                                                                                                          privacy security                                                                                                                          access control                                                                                                                          taint tracking                                                                                                                          covert channel
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号