首页 > 最新文献

Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)最新文献

英文 中文
A data mining framework for building intrusion detection models 一个用于构建入侵检测模型的数据挖掘框架
Pub Date : 1999-05-14 DOI: 10.1109/SECPRI.1999.766909
Wenke Lee, S. Stolfo, K. Mok
There is often the need to update an installed intrusion detection system (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert knowledge, changes to IDSs are expensive and slow. We describe a data mining framework for adaptively building Intrusion Detection (ID) models. The central idea is to utilize auditing programs to extract an extensive set of features that describe each network connection or host session, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal activities. These rules can then be used for misuse detection and anomaly detection. New detection models are incorporated into an existing IDS through a meta-learning (or co-operative learning) process, which produces a meta detection model that combines evidence from multiple models. We discuss the strengths of our data mining programs, namely, classification, meta-learning, association rules, and frequent episodes. We report on the results of applying these programs to the extensively gathered network audit data for the 1998 DARPA Intrusion Detection Evaluation Program.
由于新的攻击方法或升级的计算环境,通常需要更新已安装的入侵检测系统(IDS)。由于目前许多入侵防御系统都是通过手工编码专家知识来构建的,因此对入侵防御系统的修改既昂贵又缓慢。我们描述了一个用于自适应构建入侵检测(ID)模型的数据挖掘框架。其核心思想是利用审计程序来提取描述每个网络连接或主机会话的广泛特征集,并应用数据挖掘程序来学习准确捕获入侵行为和正常活动的规则。然后,这些规则可用于误用检测和异常检测。通过元学习(或合作学习)过程,将新的检测模型合并到现有的IDS中,从而产生结合多个模型证据的元检测模型。我们讨论了我们的数据挖掘程序的优势,即分类、元学习、关联规则和频繁事件。我们报告了将这些程序应用于1998年DARPA入侵检测评估计划广泛收集的网络审计数据的结果。
{"title":"A data mining framework for building intrusion detection models","authors":"Wenke Lee, S. Stolfo, K. Mok","doi":"10.1109/SECPRI.1999.766909","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766909","url":null,"abstract":"There is often the need to update an installed intrusion detection system (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert knowledge, changes to IDSs are expensive and slow. We describe a data mining framework for adaptively building Intrusion Detection (ID) models. The central idea is to utilize auditing programs to extract an extensive set of features that describe each network connection or host session, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal activities. These rules can then be used for misuse detection and anomaly detection. New detection models are incorporated into an existing IDS through a meta-learning (or co-operative learning) process, which produces a meta detection model that combines evidence from multiple models. We discuss the strengths of our data mining programs, namely, classification, meta-learning, association rules, and frequent episodes. We report on the results of applying these programs to the extensively gathered network audit data for the 1998 DARPA Intrusion Detection Evaluation Program.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1399
Verification of control flow based security properties 基于安全属性的控制流验证
Pub Date : 1999-05-14 DOI: 10.1109/SECPRI.1999.766902
T. Jensen, D. Métayer, Tommy Thorn
A fundamental problem in software based security is whether local security checks inserted into the code are sufficient to implement a global security property. We introduce a formalism based on a two-level linear time temporal logic for specifying global security properties pertaining to the control flow of the program, and illustrate its expressive power with a number of existing properties. We define a minimalistic, security dedicated program model that only contains procedure call and run time security checks and propose an automatic method for verifying that an implementation using local security checks satisfies a global security property. For a given formula in the temporal logic, we prove that there exists a bound on the size of the states that have to be considered in order to assure the validity of the formula: this reduces the problem to finite state model checking. Finally, we instantiate the framework to the security architecture proposed for Java (JDK 1.2).
基于软件的安全性中的一个基本问题是,插入到代码中的本地安全检查是否足以实现全局安全属性。我们介绍了一种基于两级线性时间时间逻辑的形式,用于指定与程序控制流相关的全局安全属性,并通过一些现有属性说明其表达能力。我们定义了一个极简的、安全专用的程序模型,它只包含过程调用和运行时安全检查,并提出了一种自动方法,用于验证使用本地安全检查的实现是否满足全局安全属性。对于时间逻辑中给定的公式,我们证明了为了保证公式的有效性而必须考虑的状态的大小存在一个界限:这将问题简化为有限状态模型检查。最后,我们将该框架实例化为针对Java (JDK 1.2)提出的安全体系结构。
{"title":"Verification of control flow based security properties","authors":"T. Jensen, D. Métayer, Tommy Thorn","doi":"10.1109/SECPRI.1999.766902","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766902","url":null,"abstract":"A fundamental problem in software based security is whether local security checks inserted into the code are sufficient to implement a global security property. We introduce a formalism based on a two-level linear time temporal logic for specifying global security properties pertaining to the control flow of the program, and illustrate its expressive power with a number of existing properties. We define a minimalistic, security dedicated program model that only contains procedure call and run time security checks and propose an automatic method for verifying that an implementation using local security checks satisfies a global security property. For a given formula in the temporal logic, we prove that there exists a bound on the size of the states that have to be considered in order to assure the validity of the formula: this reduces the problem to finite state model checking. Finally, we instantiate the framework to the security architecture proposed for Java (JDK 1.2).","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122741715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
Network security: then and now or 20 years in 10 minutes 网络安全:过去与现在还是10分钟20年
Pub Date : 1999-05-14 DOI: 10.1109/SECPRI.1999.766908
S. Kent
Summary form only given. The history of network security is outlined by looking at technology in 1979 and comparing it with that of 1999. The following areas are included: crypto based net security; access control and authentication; and security protocols.
只提供摘要形式。通过回顾1979年的技术并将其与1999年的技术进行比较,概述了网络安全的历史。包括以下领域:基于加密的网络安全;访问控制和认证;还有安全协议。
{"title":"Network security: then and now or 20 years in 10 minutes","authors":"S. Kent","doi":"10.1109/SECPRI.1999.766908","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766908","url":null,"abstract":"Summary form only given. The history of network security is outlined by looking at technology in 1979 and comparing it with that of 1999. The following areas are included: crypto based net security; access control and authentication; and security protocols.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The future is not assured-but it should be 未来是不确定的,但应该是确定的
Pub Date : 1999-05-09 DOI: 10.1109/SECPRI.1999.766921
Brian D. Snow
Twenty years from now there will still be software security-enhanced applications vulnerable to buffer overflow problems. These products should not be called secure, but will be sold as such. Twenty years from now there will still be security-enhanced operating systems that will crash when applications misbehave. They will not be secure either. The author considers how we will have sufficient functionality, plenty of performance, but not enough assurance.
从现在起20年后,仍然会有软件安全性增强的应用程序容易受到缓冲区溢出问题的影响。这些产品不应该被称为安全的,但会被称为安全的。二十年后,当应用程序出现问题时,安全增强的操作系统仍然会崩溃。他们也不会安全。作者考虑了我们将如何拥有足够的功能,足够的性能,但没有足够的保证。
{"title":"The future is not assured-but it should be","authors":"Brian D. Snow","doi":"10.1109/SECPRI.1999.766921","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766921","url":null,"abstract":"Twenty years from now there will still be software security-enhanced applications vulnerable to buffer overflow problems. These products should not be called secure, but will be sold as such. Twenty years from now there will still be security-enhanced operating systems that will crash when applications misbehave. They will not be secure either. The author considers how we will have sufficient functionality, plenty of performance, but not enough assurance.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Specification and enforcement of classification and inference constraints 分类和推理约束的规范和实施
Pub Date : 1999-05-09 DOI: 10.1109/SECPRI.1999.766913
S. Dawson, S. Vimercati, P. Samarati
Although mandatory access control in database systems has been extensively studied in recent years, and several models and systems have been proposed, capabilities for enforcement of mandatory constraints remain limited. Lack of support for expressing and combating inference channels that improperly leak protected information remains a major limitation in today's multilevel systems. Moreover the working assumption that data are classified at insertion time makes previous approaches inapplicable to the classification of existing, possibly historical, data repositories that need to be classified for release. Such a capability would be of great benefit to, and appears to be in demand by, governmental, public and private institutions. We address the problem of classifying existing data repositories by taking into consideration explicit data classification as well as association and inference constraints. Constraints are expressed in a unified, DBMS- and model-independent framework, making the approach largely applicable. We introduce the concept of minimal classification as a labeling of data elements that while satisfying the constraints, ensures that no data element is classified at a level higher than necessary. We also describe a technique and present an algorithm for generating data classifications that are both minimal and preferred according to certain criteria. Our approach is based on preprocessing, or compiling, constraints to produce a set of simple classification assignments that can then be efficiently applied to classify any database instance.
尽管近年来对数据库系统中的强制访问控制进行了广泛的研究,并提出了一些模型和系统,但强制约束的执行能力仍然有限。缺乏对表达和打击不恰当地泄漏受保护信息的推理通道的支持仍然是当今多层系统的主要限制。此外,在插入时对数据进行分类的工作假设使得以前的方法不适用于需要对发布进行分类的现有(可能是历史的)数据存储库进行分类。这种能力将对政府、公共和私人机构大有裨益,而且似乎也是它们所需要的。我们通过考虑显式数据分类以及关联和推理约束来解决对现有数据存储库进行分类的问题。约束在一个统一的、与DBMS和模型无关的框架中表示,这使得该方法在很大程度上适用。我们引入了最小分类的概念,作为数据元素的标记,它在满足约束条件的同时,确保没有数据元素在高于必要的级别上进行分类。我们还描述了一种技术,并提出了一种算法,用于根据某些标准生成最小和首选的数据分类。我们的方法基于预处理或编译约束,生成一组简单的分类分配,然后可以有效地应用于对任何数据库实例进行分类。
{"title":"Specification and enforcement of classification and inference constraints","authors":"S. Dawson, S. Vimercati, P. Samarati","doi":"10.1109/SECPRI.1999.766913","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766913","url":null,"abstract":"Although mandatory access control in database systems has been extensively studied in recent years, and several models and systems have been proposed, capabilities for enforcement of mandatory constraints remain limited. Lack of support for expressing and combating inference channels that improperly leak protected information remains a major limitation in today's multilevel systems. Moreover the working assumption that data are classified at insertion time makes previous approaches inapplicable to the classification of existing, possibly historical, data repositories that need to be classified for release. Such a capability would be of great benefit to, and appears to be in demand by, governmental, public and private institutions. We address the problem of classifying existing data repositories by taking into consideration explicit data classification as well as association and inference constraints. Constraints are expressed in a unified, DBMS- and model-independent framework, making the approach largely applicable. We introduce the concept of minimal classification as a labeling of data elements that while satisfying the constraints, ensures that no data element is classified at a level higher than necessary. We also describe a technique and present an algorithm for generating data classifications that are both minimal and preferred according to certain criteria. Our approach is based on preprocessing, or compiling, constraints to produce a set of simple classification assignments that can then be efficiently applied to classify any database instance.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130176744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Flexible policy-directed code safety 灵活的策略导向代码安全性
Pub Date : 1999-05-09 DOI: 10.1109/SECPRI.1999.766716
David Evans, Andrew Twyman
The article introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform-independent way. Policies are defined in terms of abstract resource manipulations. We describe mechanisms that can be used to efficiently and conveniently enforce these safety policies by transforming programs. We are developing implementations of Naccio that enforce policies on JavaVM classes and Win32 executables. We report on results using the JavaVM prototype.
本文介绍了一种新的代码安全方法。我们提出了Naccio,这是一种系统架构,它允许以通用和平台无关的方式表达大类安全策略。策略是根据抽象资源操作来定义的。我们描述了可以通过转换程序来有效和方便地执行这些安全策略的机制。我们正在开发对JavaVM类和Win32可执行文件执行策略的Naccio实现。我们使用JavaVM原型报告结果。
{"title":"Flexible policy-directed code safety","authors":"David Evans, Andrew Twyman","doi":"10.1109/SECPRI.1999.766716","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766716","url":null,"abstract":"The article introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform-independent way. Policies are defined in terms of abstract resource manipulations. We describe mechanisms that can be used to efficiently and conveniently enforce these safety policies by transforming programs. We are developing implementations of Naccio that enforce policies on JavaVM classes and Win32 executables. We report on results using the JavaVM prototype.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123902079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 228
Hardening COTS software with generic software wrappers 用通用软件包装器加固COTS软件
Pub Date : 1999-05-09 DOI: 10.1109/SECPRI.1999.766713
T. Fraser, L. Badger, M. Feldman
Numerous techniques exist to augment the security functionality of commercial off-the-shelf (COTS) applications and operating systems, making them more suitable for use in mission-critical systems. Although individually useful, as a group these techniques present difficulties to system developers because they are not based on a common framework which might simplify integration and promote portability and reuse. The paper presents techniques for developing Generic Software Wrappers-protected, non-bypassable kernel-resident software extensions for augmenting security without modification of COTS source. We describe the key elements of our work: our high-level Wrapper Definition Language (WDL), and our framework for configuring, activating, and managing wrappers. We also discuss code reuse, automatic management of extensions, a framework for system-building through composition, platform-independence, and our experiences with our Solaris and FreeBSD prototypes.
有许多技术可以增强商用现货(COTS)应用程序和操作系统的安全功能,使它们更适合在关键任务系统中使用。尽管单独使用很有用,但作为一个整体,这些技术给系统开发人员带来了困难,因为它们不是基于可能简化集成并促进可移植性和重用的公共框架。本文介绍了在不修改COTS源代码的情况下开发受通用软件包装保护的、不可绕过的内核驻留软件扩展以提高安全性的技术。我们描述了工作的关键元素:高级包装器定义语言(WDL),以及用于配置、激活和管理包装器的框架。我们还讨论了代码重用、扩展的自动管理、通过组合构建系统的框架、平台独立性,以及我们在Solaris和FreeBSD原型中的经验。
{"title":"Hardening COTS software with generic software wrappers","authors":"T. Fraser, L. Badger, M. Feldman","doi":"10.1109/SECPRI.1999.766713","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766713","url":null,"abstract":"Numerous techniques exist to augment the security functionality of commercial off-the-shelf (COTS) applications and operating systems, making them more suitable for use in mission-critical systems. Although individually useful, as a group these techniques present difficulties to system developers because they are not based on a common framework which might simplify integration and promote portability and reuse. The paper presents techniques for developing Generic Software Wrappers-protected, non-bypassable kernel-resident software extensions for augmenting security without modification of COTS source. We describe the key elements of our work: our high-level Wrapper Definition Language (WDL), and our framework for configuring, activating, and managing wrappers. We also discuss code reuse, automatic management of extensions, a framework for system-building through composition, platform-independence, and our experiences with our Solaris and FreeBSD prototypes.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115835325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 259
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer 使用NRL协议分析器分析Internet密钥交换协议
Pub Date : 1999-05-09 DOI: 10.1109/SECPRI.1999.766916
C. Meadows
We show how the NRL Protocol Analyzer, a special-purpose formal methods tool designed for the verification of cryptographic protocols, was used in the analysis of the Internet Key Exchange (IKE) protocol. We describe some of the challenges we faced in analyzing IKE, which specifies a set of closely related subprotocols, and we show how this led to a number of improvements to the Analyzer. We also describe the results of our analysis, which uncovered several ambiguities and omissions in the specification which would have made possible attacks on some implementations that conformed to the letter, if not necessarily the intentions, of the specifications.
我们展示了NRL协议分析器是如何用于分析互联网密钥交换(IKE)协议的。NRL协议分析器是一种为验证加密协议而设计的专用形式化方法工具。我们描述了在分析IKE(它指定了一组密切相关的子协议)时所面临的一些挑战,并展示了这如何导致对Analyzer的许多改进。我们还描述了我们的分析结果,它揭示了规范中的几个含糊之处和遗漏,这些可能会对一些符合规范的实现(如果不一定是规范的意图)造成攻击。
{"title":"Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer","authors":"C. Meadows","doi":"10.1109/SECPRI.1999.766916","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766916","url":null,"abstract":"We show how the NRL Protocol Analyzer, a special-purpose formal methods tool designed for the verification of cryptographic protocols, was used in the analysis of the Internet Key Exchange (IKE) protocol. We describe some of the challenges we faced in analyzing IKE, which specifies a set of closely related subprotocols, and we show how this led to a number of improvements to the Analyzer. We also describe the results of our analysis, which uncovered several ambiguities and omissions in the specification which would have made possible attacks on some implementations that conformed to the letter, if not necessarily the intentions, of the specifications.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122160185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 171
20 years of operating systems security 20年的操作系统安全
Pub Date : 1999-05-09 DOI: 10.1109/SECPRI.1999.766904
V. Gligor
The author presents some highlights of two areas of operating systems security that figured prominently in some of the best research in the areas of security and privacy over the past twenty years (1980-99). He examines the following: reference monitors and trusted computing bases, and intrusion detection.
作者介绍了操作系统安全的两个重点领域,这两个领域在过去二十年(1980- 1999)的安全和隐私领域的一些最佳研究中占有突出地位。他研究了以下内容:参考监视器和可信计算基础,以及入侵检测。
{"title":"20 years of operating systems security","authors":"V. Gligor","doi":"10.1109/SECPRI.1999.766904","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766904","url":null,"abstract":"The author presents some highlights of two areas of operating systems security that figured prominently in some of the best research in the areas of security and privacy over the past twenty years (1980-99). He examines the following: reference monitors and trusted computing bases, and intrusion detection.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114970675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A test for non-disclosure in security level translations 安全级别翻译的不公开测试
Pub Date : 1999-05-09 DOI: 10.1109/SECPRI.1999.766914
D. Rosenthal, Francis Fung
Two security domains that want to exchange information securely may need to agree on translations of mandatory access control (MAC) labels of their information, if their MAC labels have a different syntax or semantics. It is desirable that these translations do not introduce any confidentiality violations. We present a property, the security level translation property (SLTP), which must hold if the security level translation functions satisfy MAC confidentiality. This property is in some sense the best possible non-disclosure test of the level translations in the absence of a "common domain" that gives the real relationships among the levels of the two domains.
如果两个安全域的MAC标签具有不同的语法或语义,那么希望安全地交换信息的安全域可能需要就其信息的强制访问控制(MAC)标签的翻译达成一致。希望这些翻译不引入任何违反机密的行为。我们提出了一个属性,即安全级别转换属性(SLTP),如果安全级别转换功能满足MAC机密性,则必须保留该属性。从某种意义上说,这个属性是在没有“公共领域”的情况下,在两个领域的级别之间给出真实关系的情况下,关卡翻译的最佳非公开测试。
{"title":"A test for non-disclosure in security level translations","authors":"D. Rosenthal, Francis Fung","doi":"10.1109/SECPRI.1999.766914","DOIUrl":"https://doi.org/10.1109/SECPRI.1999.766914","url":null,"abstract":"Two security domains that want to exchange information securely may need to agree on translations of mandatory access control (MAC) labels of their information, if their MAC labels have a different syntax or semantics. It is desirable that these translations do not introduce any confidentiality violations. We present a property, the security level translation property (SLTP), which must hold if the security level translation functions satisfy MAC confidentiality. This property is in some sense the best possible non-disclosure test of the level translations in the absence of a \"common domain\" that gives the real relationships among the levels of the two domains.","PeriodicalId":204019,"journal":{"name":"Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133409550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1