计算机科学 ›› 2015, Vol. 42 ›› Issue (7): 178-181.doi: 10.11896/j.issn.1002-137X.2015.07.039
黄 勇 吴尽昭
HUANG Yong WU Jin-zhao
摘要: 针对目前分布式计算安全模型存在的不足,以能有效描述位置和移动性的形式化模型Seal演算为工具,将系统安全属性的刻画归结为系统进程在给定计算环境下的位置互模拟等价,提出一种无干扰安全模型,其可以方便地刻画不同的安全性质。为满足实际安全需求,提出了一种可复合的安全属性,并给出了相应的证明。最后,通过实例分析表明了模型的有效性。
[1] Fernando N,Loke S W,Rahayu W.Mobile Cloud Computing:a Survey [J].Future Generation Computer Systems,2013,29(1):84-106 [2] Roman R,Zhou Jian-ying,Lopez J.On The Features and Challenges of Security and Privacy in Distributed Internet of Things [J].Computer Networks,2013,7(10):2266-2279 [3] Goguen J A,Meseguer J.Security Policies And Security Models[C]∥Proc.IEEE Symp.on Security and Privacy.1982:11-20 [4] Sutherland D.A Model of Information[C]∥Proc.NationalComputer Security Conf..1986:175-183 [5] Wittbold J T,Johnson D M.Information Flow in Nondetermi-nistic Systems[C]∥Proceedings of IEEE Symp.on Security and Privacy.IEEE Computer Society Press,1990:144-161 [6] Focardi R,Corrieri R.Classification of Security Properties(Part I:Information Flow)[J].Foundations of Security Analysis and Design-Tutorial Lectures,Springer-Verlag,volume 2171 of LNCS,2001:331-396 [7] Focardi R,Rossi S.Information Flow Security in Dynamic Contexts [J].Journal of Computer Security,2006,14 (1):65-110 [8] Oheimb D.Information Flow Control Revisited:Noninfluence=Noninterference+Nonleakage [C]∥Proceedings of European Symposium on Research in Computer Security 2004 (ESORICS’04).Springer-Verlag,Vol.LNCS 3193,2004:225-243 [9] Riely J,Matthew H.Distributed Processes and Location Failures[J].Theoretical Computer Science Archive,2001,266(122):693-735 [10] 王立斌,陈克非.可移动系统安全模型统一框架[J].电子学报,2002,30(12A):2108-2110 Wang Li-bin,Chen Ke-fei.A Uniform Framework of Security Model for Mobile Systems [J].Acta Electronica Sinica,2002,0(12A):2108-2110 [11] 余万涛,胡光锐.考虑位置失效的移动系统安全模型[J].计算机应用研究,2006,10:128-129 Yu Wan-tao,Hu Guang-rui.Security Model for Mobile Systems with Location Failures [J].Application Research of Computers,2006,0:128-129 [12] Castagnaa G,Vitekb J,Zappa Nardelli F.The Seal Calculus [J].Information and Computation,2005,201(1):1-54 [13] Davide Sangiorgi,David Walker.The Pi-Calculus:A Theory of Mobile Processes [M].Cambridge University Press,2002 [14] Cardelli L,Gordon A D.Mobile Ambients[J].Foundations ofSoftware Science and Computation Structures,LNCS,1998,1378:140-155 [15] Bugliesi M,Gallina L,Hamadou S,et al.Behavioral Equivalences and Interference Metrics for Mobile Ad-Hoc Networks [J].Performance Evaluation,2014,3:41-72 |
No related articles found! |
|