J4 ›› 2011, Vol. 46 ›› Issue (9): 28-34.

• Articles • Previous Articles     Next Articles

Security assurance method based on non-interference

SUN Yu1, CHEN Ya-sha2, ZHANG Xing1, LIU Yi1   

  1. 1. Computer Science Department, Beijing University of Technology, Beijing 100022, China;
    2. College of Information and Electrical Engineering, Naval University of Engineering, Wuhan 430033, Hubei, China
  • Received:2011-05-21 Online:2011-09-20 Published:2011-09-08

Abstract:

In recent years, more and more researchers have taken attention to security assurance as an important aspect of operating system security. For high level secure operating system, structuration of architecture level must be met as security assurance requirements, which is the essential characteristics from the low level secure system. Firstly, the lacks of the traditional information flow model on solving the problem of security are analyzed, and the description and reflect of the security assurance in non-interference model are studied. Then structural rules are raised that can match reference monitor hypothesis. Secondly, the concept of the trusted pipeline is applied to the structural assurance of non-interference model, and security of the new model is proven. Finally, an implementation scheme of structured information flow control based on trusted pipeline is proposed.
 

Key words: structuration; non-interference; process; reference monitor; security assurance

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!