首页 | 本学科首页   官方微博 | 高级检索  
     

基于Java平台实现安全行为模型验证
引用本文:李泽鹏,金英,张晶,郑晓娟.基于Java平台实现安全行为模型验证[J].计算机工程与科学,2007,29(10):7-10.
作者姓名:李泽鹏  金英  张晶  郑晓娟
作者单位:吉林大学计算机科学与技术学院,吉林,长春,130012;东北师范大学软件学院,吉林,长春,130117
摘    要:非信任代码的安全执行是移动代码安全的重要问题之一。携带模型代码方法同时从移动代码的生产者和使用者的角度考虑,为安全执行非信任代码提供了一个系统、全面且有效的解决方案。该方法主要包括安全策略的定义、安全行为模型的生成,以及其验证和安全策略的强制实施。针对已被广泛使用的Java平台,在深入分析其基于访问控制的安全体系结构的基础上,通过对Java核心类的修改和扩展,提出了一种能增加新的安全策略,以及实现MCC方法中安全行为模型验证的方法,为提高Java安全策略的描述能力,以及基于于Java平台实现MCC方法,确保更全面的安全机制提供了可行的途径。

关 键 词:携带模型代码  Java安全机制  安全行为模型  形式验证
文章编号:1007-130X(2007)10-0007-04
修稿时间:2007-03-292007-07-09

Implementation of Verifying the Security Related Behavior Model Based on the Java Platform
LI Ze-peng,JIN Ying,ZHANG Jing,ZHENG Xiao-juan.Implementation of Verifying the Security Related Behavior Model Based on the Java Platform[J].Computer Engineering & Science,2007,29(10):7-10.
Authors:LI Ze-peng  JIN Ying  ZHANG Jing  ZHENG Xiao-juan
Affiliation:1. School of Computer Science and Technology,Jilin University,Changchun 130012; 2. School of Software,Northeast Normal University,Changchun 130117,China
Abstract:Safe execution of untrusted mobile code is one of the key problems in mobile code security.Model-carrying code(MCC) provides a systematic,complete and effective solution to the problem from the viewpoints of both the producer and the consumer of mobile code.MCC mainly includes the specification of security policies,the generation and verification of the security-related behavior model,and the enforcement of security policies.The Java 2 platform is widely used currently.Through the analysis of its access-control-based security architecture,an approach to adding new security policies and the implementation of security-related model verification is presented through modifying and extending the Java 2 kernel classes.The approach can improve Java 2 in supporting security policies,and provides a feasible way to guarantee a more complete security mechanism by implementing MCC based on the Java 2 platform.
Keywords:model carrying code  java security mechanism  security related behavior model  formal verification
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号