首页 | 本学科首页   官方微博 | 高级检索  
     

基于内容和地点维度的机密信息降级策略
引用本文:朱浩,庄毅,薛羽,丁卫平.基于内容和地点维度的机密信息降级策略[J].计算机科学,2012,39(8):153-157,185.
作者姓名:朱浩  庄毅  薛羽  丁卫平
作者单位:1. 南京航空航天大学计算机科学与技术学院 南京210016;南通大学计算机科学与技术学院 南通226019
2. 南京航空航天大学计算机科学与技术学院 南京210016
基金项目:航空基金,江苏省普通高校研究生科研创新计划项目
摘    要:目前机密信息降级策略的研究主要集中在信息降级的内容、地点、时间等维度上,每个维度的策略都有一定的局限性,攻击者将会利用其他维度的漏洞,非法获取额外的机密信息。降级策略需要综合考虑多个维度来确保机密信息的可信降级。为此,利用攻击者知识模型,提出了一种基于内容和地点维度的降级策略。内容维度的关键思想是攻击者不允许通过滥用降级机制来获取额外的机密信息,而地点维度控制机密信息仅能通过特定的语句进行降级。此外,建立了该策略实施的类型规则,并证明了类型规则的可靠性。

关 键 词:信息流控制  降级策略  机密性  无干扰

Declassification Policy Based on Content and Location Dimensions
ZHU Hao , ZHUANG Yi , XUE Yu , DING Wei-ping.Declassification Policy Based on Content and Location Dimensions[J].Computer Science,2012,39(8):153-157,185.
Authors:ZHU Hao  ZHUANG Yi  XUE Yu  DING Wei-ping
Affiliation:1,2(School of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China)1(School of Computer Science and Technology,Nantong University,Nantong 226019,China)2
Abstract:Current research on declassification policies mainly involves content, location, time and other dimensions, and each of them has some limitations. Attacker could learn more confidential information than intended by using the vulner}r bility of other dimensions. A synthesis of different dimensions in declassification policy would further improve assu- rance that confidential information is being declassified properly. This paper proposed a declassification policy based on the content and location dimensions, using attacker knowledge model. The key idea of content dimension of the policy is that attacker is not allowed to increase observations about confidential information by causing misuse of the declassifica- lion mechanism,and that location dimension of the policy controls confidential information is declassified only through the declassification statement. Additionally,we established type rules of policy enforcement and proved its soundness.
Keywords:Information-flow controls  Declassification policy  Confidentiality  Non-interference
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号