JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (3): 35-42.doi: 10.6040/j.issn.1671-9352.2.2019.124

Previous Articles    

Component system security based on non-interference

XU Ming-di1, JIN Zhao-yang1, CUI Feng1, ZHANG Fan2*   

  1. 1. Wuhan Digital and Engineering Institute, Wuhan 430205, Hubei, China;
    2. School of Mathematics and Computer Science, Wuhan Polytechnic University, Wuhan 430023, Hubei, China
  • Published:2020-03-27

Abstract: Information flow non-interference problem of mutil-level security in components system is studied. The behavior of components with security process algebra(SPA)language is captured to construct interface automata computational model based on the existing interface structure. Some bisimular non-interference properties are analyzed to construct SIA_NI which applies for interface model and is proved security under complex operations such as adding, deleting and combining operators. Finally, an instance is cited to handle this non-interference properties in component-based system and CoPS software is used to automatically verify the correctness of the algorithm on mutil-level security component system.

Key words: information flow security, non-interference, interface security

CLC Number: 

  • TP391
[1] SIIRTOLA A. Parametrised interface automata[C] // 14th International Conference on Application of Concurrency to System Design(ACSD).[S.l.] : IEEE, 2014.
[2] 孙聪, 习宁, 高胜, 等. 基于接口精化的广义无干扰性研究[J]. 计算机研究与发展, 2015, 52(7):1631-1641. SUN Cong, XI Ning, GAO Sheng, et al. A generalized non-interference based on refinement of interfaces[J]. Journal of Computer Research and Development, 2015, 52(7):1631-1641.
[3] FENDRICH S, LÜTTGEN G. A generalised theory of interface automata, component compatibility and error[J]. Acta Informatica, 2019, 56(4):287-319.
[4] GOGUEN J A, MESEGUER J. Security policies and security models[C] // 1982 IEEE Symposium on Security and Privacy, April 26-28, 1982. Oakland: IEEE, 1982.
[5] BEN SAID N, ABDELLATIF T, BENSALEM S, et al. Model-driven information flow security for component-based systems[M] //From Programs to Systems. The Systems Perspective in Computing. Berlin: Springer, 2014: 1-20.
[6] 张驰, 褚楚. 软件组件组装行为兼容性检查研究[J]. 计算机工程与应用, 2016, 52(11):30-33. ZHANG Chi, CHU Chu. Research on verifying of behavioral compatibility for software component composition[J]. Computer Engineering and Applications, 2016, 52(11):30-33.
[7] BOSSI A, FOCARDI R, PIAZZA C, et al. Bisimulation and unwinding for verifying possibilistic security properties[C] // International Workshop on Verification, Model Checking, and Abstract Interpretation. Berlin: Springer, 2003: 223-237.
[8] LEE M, D'ARGENIO P R. A refinement based notion of non-interference for interface automata: compositionality, decidability and synthesis[C] // XXIX International Conference of the Chilean Computer Science Society. Antofagasta: IEEE Computer Society, 2010.
[9] SUN C, XI N, MA J F. Enforcing generalized refinement-based noninterference for secure interface composition[C] // 2017 IEEE 41st Annual Computer Software and Applications Conference(COMPSAC). Turin: IEEE, 2017.
[10] DE ALFARO L, HENZINGER T A. Interface theories for component-based design[C] // International Workshop on Embedded Software. Berlin: Springer, 2001: 148-165.
[11] FOCARDI R, GORRIERI R. A classification of security properties for process Algebras1[J]. Journal of Computer Security, 1995, 3(1):5-33.
[12] DE ALFARO L, HENZINGER T A. Interface automata[J]. ACM SIGSOFT Software Engineering Notes, 2001, 26(5):109.
[13] 周伟, 尹青, 郭金庚. 计算机安全中的无干扰模型[J]. 计算机科学, 2005, 32(2):159-165. ZHOU Wei, YIN Qing, GUO Jingeng. Non-interference models in computer security[J]. Computer Science, 2005, 32(2):159-165.
[1] SUN Yu1, CHEN Ya-sha2, ZHANG Xing1, LIU Yi1. Security assurance method based on non-interference [J]. J4, 2011, 46(9): 28-34.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!