A security verification method for information flow security policies implemented in operating systems

被引:0
|
作者
Yi, XD [1 ]
Yang, XJ [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Peoples R China
关键词
secure operating system; security verification; information flow security policy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, operating system security depends much on the security policies implemented in the system. It's necessary to verify whether the secure operating system's implementation of security policies is correct. The paper provides a general and automaticable security verification method which is suitable for deploying in practice to verify information flow security policies implemented in information systems specially in secure operating systems. We first use information flow graphs (IFG) to express the information flow security policies specified by temporal logic. Then, based on the express method, we supply a verification framework to verify whether the implementation of an information system satisfies the restrictions of security policies. At last, a security verification framework based on mandatory access control (MAC) which is fit for current secure operating systems has been given.
引用
收藏
页码:280 / 291
页数:12
相关论文
共 50 条
  • [1] An information flow security policy verification methodology and its application in operating systems
    Yi, XD
    Yang, XJ
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 700 - 703
  • [2] Definition of Information Systems Security Policies
    Lopes, Isabel Maria
    Pereira, Joao Paulo
    Oliveira, Pedro
    [J]. RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2017, 571 : 225 - 234
  • [3] The compositional security checker: A tool for the verification of information flow security properties
    Focardi, R
    Gorrieri, R
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (09) : 550 - 571
  • [4] MODEL FOR VERIFICATION OF DATA SECURITY IN OPERATING-SYSTEMS
    POPEK, GJ
    FARBER, DA
    [J]. COMMUNICATIONS OF THE ACM, 1978, 21 (09) : 737 - 749
  • [5] Compliance Verification Algorithm for Computer Systems Security Policies
    Pene, Liviu
    Hamza, Lamia
    Adi, Kamel
    [J]. E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 96 - 115
  • [6] Verification of Cloud Security Policies
    Miller, Loic
    Merindol, Pascal
    Gallais, Antoine
    Pelsser, Cristel
    [J]. 2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [7] Information systems security policies: a contextual perspective
    Karyda, M
    Kiountouzis, E
    Kokolakis, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (03) : 246 - 260
  • [8] Information flow query and verification for security policy of Security-Enhanced Linux
    Chen, Yi-Ming
    Kao, Yung-Wei
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 389 - 404
  • [9] Specification of Information Flow Security Policies in Model-Based Systems Engineering
    Gerking, Christopher
    [J]. SOFTWARE TECHNOLOGIES: APPLICATIONS AND FOUNDATIONS, 2018, 11176 : 617 - 632
  • [10] Information flow security for interactive systems
    Jin, Y
    Liu, L
    Zheng, XJ
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, 2005, 3824 : 1045 - 1054