Computer Science ›› 2016, Vol. 43 ›› Issue (10): 141-144.doi: 10.11896/j.issn.1002-137X.2016.10.026

Previous Articles     Next Articles

Trust Chain Transfer Model Based on Non-interference Theory

CHEN Liang, ZENG Rong-ren, LI Feng and YANG Wei-ming   

  • Online:2018-12-01 Published:2018-12-01

Abstract: As the existing trust chain transfer model is lack of availability and has the disadvantage of extending the credibility of the trust chain to the network system,a new model of trust chain transfer based on non-interference theory was proposed.The model abstracts the system to processes,actions and implementation.The model measures the integrity of static process and dynamic library to ensure the static process credible,uses non-interference theory analysis of the relationship between the interactive processes to determine its legitimacy,and extends the chain of trust to the whole network system through measuring the credibility of the access terminal.Finally,the corresponding formal definition and security proof were given.

Key words: Non-interference theory,Process credible,System operation credible,Secure access credible

[1] Shen Chang-xiang,Zhang Huang-guo,Feng Deng-guo,et al.The summary of information security[J].Science in China Press,2007,37(2):129-150(in Chinese) 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学 E 辑:信息科学,2007,37(2):129-150
[2] Zhang Xing,Chen You-lei,Shen Chang-xiang.A non-interfe-rence Trusted model based on process.Journal on Communications,2009,30(3):6-11(in Chinese) 张兴,陈幼雷,沈昌祥.基于进程的无干扰可信模型[J].通信学报,2009,30(3):6-11
[3] Zhao jia,Shen Chang-xiang,Liu Ji-qiang,et al.A noninterfe-rence-based trusted chain model [J].Journal of Computer Research and Development,2008,45(6):974-980(in Chinese) 赵佳,沈昌祥,刘吉强,等.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980
[4] Rushby J.Noninterference,transitivity,and channel-control security policies[M].SRI International,Computer Science Laboratory,1992
[5] Liu Wei-peng,Zhang Xing.Research of duality and multi-level security model based on intransitive noninterference theory[J].Journal on Communications,2009,30(2):52-58(in Chinese) 刘威鹏,张兴.基于非传递无干扰理论的二元多级安全模型研究[J].通信学报,2009,30(2):52-58
[6] Chen Ju,Tan Liang.Trusted Terminal Model Based on Process Protection[J].Computer Science,2011,38(4):115-117(in Chinese) 陈菊,谭良.一个基于进程保护的可信终端模型[J].计算机科学,2011,38(4):115-117
[7] Xu Fu.Intransitive Noninterference Trusted Model SupportingProcess Codes Modification[J].Computer Engineering,2013,39(11):150-153,168(in Chinese) 徐甫.支持进程代码修改的非传递无干扰可信模型[J].计算机工程,2013,39(11):150-153,8
[8] Qin Xi,Chang Chao-wen,Shen Chang-xiang,et al.Research on Trusted Terminal Computer Model Tolerating Untrusted Componenets[J].Chinese Journal of Electronics,2011,39(4):934-939(in Chinese) 秦晰,常朝稳,沈昌祥,等.容忍非信任组件的可信终端模型研究[J].电子学报,2011,39(4):934-939
[9] Goguen J A,Meseguer J.EQLOG:Equality,types,and generic Modules for logic programming[M].Functional and Logic Programming.DeGroot D,Lindstrom G.eds.,Springer-Verlag,1986
[10] 梁元.基于云计算环境下的可信平台设计[D].成都:电子科技大学,2013
[11] Zhu C,Dai X.Model of trust management based on finite statemachine[C]∥2012 International Conference on Cyber Security,Cyber Warfare and Digital Forensic (CyberSec).IEEE,2012:161-164
[12] Si Li-min,Cai Mian,Chen Yin-jing,et al.Research of a Trust Chain Transfer Model[J].Computer Science,2011,38(9):79-81(in Chinese) 司丽敏,蔡勉,陈银镜,等.一种信任链传递模型研究[J].计算机科学,2011,38(9):79-81
[13] Zhang Xing,Huang Qiang,Shen Chang-xiang.A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform[J].Chinese Journal of Computers,2010,33(1):74-81(in Chinese) 张兴,黄强,沈昌祥.一种基于无干扰模型的信任链传递分析方法[J].计算机学报,2010,33(1):74-81

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!