Dynamic enforcement of the Strict integrity policy

被引:0
|
作者
Zhang, XF [1 ]
Liang, HL [1 ]
Sun, YF [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China
关键词
information system security; information integrity; Strict integrity policy; Biba's model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Strict integrity policy (SIP) in Biba's integrity model is widely used in protecting information integrity, but the static integrity labels of both subjects and objects increase compatibility cost of applications and might prevent some operations that are indeed harmless. In order to improve compatibility, Dynamic enforcement of the Strict integrity policy (DESIP) is put forward. The current integrity label attribute of a subject in SIP is replaced with two attributes in DESIP, which are used to confine dynamically the range of objects a subject could be allowed to access. The new rules of access control in DESIP are given for each kind of access mode (observe, modify and invoke) together with the proofs of their validity. Comparison between SIP and DESIP shows that after a sequence of operations, a subject controlled by DESIP tends to behave in a similar way as it is controlled by SIP and DESIP is more compatible than SIP.
引用
收藏
页码:49 / 53
页数:5
相关论文
共 50 条
  • [1] Dynamic enforcement of the strict integrity policy in Biba's model
    Zhang, Xiangfeng
    Sun, Yufang
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2005, 42 (05): : 746 - 754
  • [2] ANTITRUST POLICY IN EUROPE - EMERGENCE OF STRICT ENFORCEMENT
    BRUN, S
    [J]. JOURNAL OF WORLD TRADE, 1974, 8 (05) : 475 - 491
  • [3] Dynamic Enforcement of Platform Integrity
    Pirker, Martin
    Toegl, Ronald
    Gissing, Michael
    [J]. TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 265 - 272
  • [4] Rigorous enforcement of policy crucial to enhance scientific integrity
    Agoramoorthy, Govindasamy
    [J]. CURRENT SCIENCE, 2017, 113 (05): : 833 - 833
  • [5] Dynamic Security Policy Enforcement on Android
    Vanco, Matus
    Aron, Lukas
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 141 - 148
  • [6] In-Depth Enforcement of Dynamic Integrity Taint Analysis
    Amir-Mohammadian, Sepehr
    Skalka, Christian
    [J]. PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS'16), 2016, : 43 - 56
  • [7] Control Flow Integrity Enforcement with Dynamic Code Optimization
    Lin, Yan
    Tang, Xiaoxiao
    Gao, Debin
    Fu, Jianming
    [J]. INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 366 - 385
  • [8] Simulation verification and validation by dynamic policy enforcement
    Tsai, WT
    Liu, X
    Chen, Y
    Paul, R
    [J]. 38th Annual Simulation Symposium, Proceedings, 2005, : 91 - 98
  • [9] STRICT ENFORCEMENT OF EXTRATERRITORIAL DISCOVERY
    TEITELBAUM, DE
    [J]. STANFORD LAW REVIEW, 1986, 38 (03) : 841 - 890
  • [10] Simulation verification and validation by dynamic policy specification and enforcement
    Tsai, W. T.
    Chen, Yinong
    Paul, Ray
    Zhou, Xinyu
    Fan, Chun
    [J]. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2006, 82 (05): : 295 - 310