计算机科学 ›› 2015, Vol. 42 ›› Issue (7): 178-181.doi: 10.11896/j.issn.1002-137X.2015.07.039

• 信息安全 • 上一篇    下一篇

基于Seal演算的分布式系统安全模型

黄 勇 吴尽昭   

  1. 广西民族大学信息科学与工程学院 南宁530006 中国科学院成都计算机应用研究所 成都610041
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(11371003,6),广西自然科学基金(2011GXNSFA018154),广西高等学校优秀人才资助

Security Model for Distributed System Based on Seal Calculus

HUANG Yong WU Jin-zhao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对目前分布式计算安全模型存在的不足,以能有效描述位置和移动性的形式化模型Seal演算为工具,将系统安全属性的刻画归结为系统进程在给定计算环境下的位置互模拟等价,提出一种无干扰安全模型,其可以方便地刻画不同的安全性质。为满足实际安全需求,提出了一种可复合的安全属性,并给出了相应的证明。最后,通过实例分析表明了模型的有效性。

关键词: 分布式系统,Seal演算,位置互模拟,安全模型

Abstract: To address the weaknesses of the current security model for distributed computation,this paper proposed a non-interference security model,which is described in the setting of Seal calculus.The new model reduces the characteri-zation of systems security to the location bisimulation equivalence of certain processes in which the position and mobility of systems have been taken into consideration.This paper also proved that the model can define a composite security property according to the security requirements of distributed systems.Finally,a case study was illuminated to show the practical application of this model.

Key words: Distributed system,Seal calculus,Location bisimulation,Security model

[1] Fernando N,Loke S W,Rahayu W.Mobile Cloud Computing:a Survey [J].Future Generation Computer Systems,2013,29(1):84-106
[2] Roman R,Zhou Jian-ying,Lopez J.On The Features and Challenges of Security and Privacy in Distributed Internet of Things [J].Computer Networks,2013,7(10):2266-2279
[3] Goguen J A,Meseguer J.Security Policies And Security Models[C]∥Proc.IEEE Symp.on Security and Privacy.1982:11-20
[4] Sutherland D.A Model of Information[C]∥Proc.NationalComputer Security Conf..1986:175-183
[5] Wittbold J T,Johnson D M.Information Flow in Nondetermi-nistic Systems[C]∥Proceedings of IEEE Symp.on Security and Privacy.IEEE Computer Society Press,1990:144-161
[6] Focardi R,Corrieri R.Classification of Security Properties(Part I:Information Flow)[J].Foundations of Security Analysis and Design-Tutorial Lectures,Springer-Verlag,volume 2171 of LNCS,2001:331-396
[7] Focardi R,Rossi S.Information Flow Security in Dynamic Contexts [J].Journal of Computer Security,2006,14 (1):65-110
[8] Oheimb D.Information Flow Control Revisited:Noninfluence=Noninterference+Nonleakage [C]∥Proceedings of European Symposium on Research in Computer Security 2004 (ESORICS’04).Springer-Verlag,Vol.LNCS 3193,2004:225-243
[9] Riely J,Matthew H.Distributed Processes and Location Failures[J].Theoretical Computer Science Archive,2001,266(122):693-735
[10] 王立斌,陈克非.可移动系统安全模型统一框架[J].电子学报,2002,30(12A):2108-2110 Wang Li-bin,Chen Ke-fei.A Uniform Framework of Security Model for Mobile Systems [J].Acta Electronica Sinica,2002,0(12A):2108-2110
[11] 余万涛,胡光锐.考虑位置失效的移动系统安全模型[J].计算机应用研究,2006,10:128-129 Yu Wan-tao,Hu Guang-rui.Security Model for Mobile Systems with Location Failures [J].Application Research of Computers,2006,0:128-129
[12] Castagnaa G,Vitekb J,Zappa Nardelli F.The Seal Calculus [J].Information and Computation,2005,201(1):1-54
[13] Davide Sangiorgi,David Walker.The Pi-Calculus:A Theory of Mobile Processes [M].Cambridge University Press,2002
[14] Cardelli L,Gordon A D.Mobile Ambients[J].Foundations ofSoftware Science and Computation Structures,LNCS,1998,1378:140-155
[15] Bugliesi M,Gallina L,Hamadou S,et al.Behavioral Equivalences and Interference Metrics for Mobile Ad-Hoc Networks [J].Performance Evaluation,2014,3:41-72

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!