首页 > 最新文献

[1992] Proceedings The Computer Security Foundations Workshop V最新文献

英文 中文
A classical automata approach to noninterference type problems 无干扰型问题的经典自动机方法
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236792
I. S. Moskowitz, O. Costich
Using classical automata theory the authors show how noninterference can be viewed as a relatively simple phenomenon. They also give direction for future work concerning probabilistic security problems using classical automata theory.<>
利用经典自动机理论,作者展示了如何将不干涉视为一种相对简单的现象。它们也为今后使用经典自动机理论研究概率安全问题指明了方向
{"title":"A classical automata approach to noninterference type problems","authors":"I. S. Moskowitz, O. Costich","doi":"10.1109/CSFW.1992.236792","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236792","url":null,"abstract":"Using classical automata theory the authors show how noninterference can be viewed as a relatively simple phenomenon. They also give direction for future work concerning probabilistic security problems using classical automata theory.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An algebraic approach to non-interference (computer security) 不干扰的代数方法(计算机安全)
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236789
Sylvan Pinsky
This paper introduces necessary and sufficient conditions for solving the Haigh-Young view-identical problem. A decision procedure, based on properties of the state transition matrix and the function relating states to outputs, is used to establish the equivalence between non-interference and the existence of Haigh-Young view-identical relations on the set of states.<>
本文介绍了解决海杨观点相同问题的充分必要条件。利用状态转移矩阵的性质和状态与输出的关系函数,建立了状态集合上不干涉与存在海杨视图相同关系的等价性。
{"title":"An algebraic approach to non-interference (computer security)","authors":"Sylvan Pinsky","doi":"10.1109/CSFW.1992.236789","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236789","url":null,"abstract":"This paper introduces necessary and sufficient conditions for solving the Haigh-Young view-identical problem. A decision procedure, based on properties of the state transition matrix and the function relating states to outputs, is used to establish the equivalence between non-interference and the existence of Haigh-Young view-identical relations on the set of states.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115114311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of some delegation protocols for distributed systems 分布式系统委托协议的分析
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236784
Claudio Calvelli, V. Varadharajan
This papers gives a precise analysis of some of the delegation protocols described by V. Varadharajan et. al. (1991). They analysed the problem of delegation in distributed systems and proposed three delegation protocols-chained, nested and linked-based on different inter-object trust assumptions in the system. They also considered some delegation protocols for the Kerberos authentication system. The authors give an analysis of the chained, nested, and linked delegation protocols using the calculus for access control by M. Abadi et. al. (1991), and analyse the delegation protocols for Kerberos using the belief logic of R. Kaislar and V.D. Gligor (1991).<>
本文对V. Varadharajan等人(1991)所描述的一些授权协议进行了精确的分析。他们分析了分布式系统中的委托问题,基于系统中不同的对象间信任假设,提出了链式、嵌套式和链接式三种委托协议。他们还考虑了Kerberos身份验证系统的一些委托协议。作者使用M. Abadi et. al.(1991)的访问控制演法对链式、嵌套式和链接式授权协议进行了分析,并使用R. Kaislar和V.D. Gligor(1991)的信念逻辑对Kerberos授权协议进行了分析
{"title":"An analysis of some delegation protocols for distributed systems","authors":"Claudio Calvelli, V. Varadharajan","doi":"10.1109/CSFW.1992.236784","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236784","url":null,"abstract":"This papers gives a precise analysis of some of the delegation protocols described by V. Varadharajan et. al. (1991). They analysed the problem of delegation in distributed systems and proposed three delegation protocols-chained, nested and linked-based on different inter-object trust assumptions in the system. They also considered some delegation protocols for the Kerberos authentication system. The authors give an analysis of the chained, nested, and linked delegation protocols using the calculus for access control by M. Abadi et. al. (1991), and analyse the delegation protocols for Kerberos using the belief logic of R. Kaislar and V.D. Gligor (1991).<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131125511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Partial belief and probabilistic reasoning in the analysis of secure protocols 安全协议分析中的部分信念与概率推理
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236785
E. Campbell, R. Safavi-Naini, P. Pleasants
The authors propose an extension of the BAN logic to reason about a secure protocol in a hostile and/or unknown environment. Probabilities, attached to the sentences and rules of the logic, allow them to quantify the beliefs of principals and represent the insecurities and uncertainties of a real life situation. They develop a probabilistic logic and obtain tight lower bounds on the probability of the conclusion which correspond to the minimum trust that can be put on the goal of the protocol. This gives them a powerful tool to model and study the performance of secure protocols. They discuss a probabilistic semantic for BAN logic and apply the results to the Needham-Schroeder protocol. The paper concludes by discussing the merits of these results and mentioning some open problems.<>
作者提出了BAN逻辑的扩展,以在敌对和/或未知环境中推理安全协议。与逻辑的句子和规则相关联的概率,使它们能够量化主体的信念,并代表现实生活中不安全和不确定的情况。他们发展了一种概率逻辑,并得到了结论的概率的紧下界,该下界对应于协议目标所能得到的最小信任。这为他们提供了一个强大的工具来建模和研究安全协议的性能。他们讨论了BAN逻辑的概率语义,并将结果应用于Needham-Schroeder协议。文章最后讨论了这些结果的优点,并提出了一些有待解决的问题。
{"title":"Partial belief and probabilistic reasoning in the analysis of secure protocols","authors":"E. Campbell, R. Safavi-Naini, P. Pleasants","doi":"10.1109/CSFW.1992.236785","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236785","url":null,"abstract":"The authors propose an extension of the BAN logic to reason about a secure protocol in a hostile and/or unknown environment. Probabilities, attached to the sentences and rules of the logic, allow them to quantify the beliefs of principals and represent the insecurities and uncertainties of a real life situation. They develop a probabilistic logic and obtain tight lower bounds on the probability of the conclusion which correspond to the minimum trust that can be put on the goal of the protocol. This gives them a powerful tool to model and study the performance of secure protocols. They discuss a probabilistic semantic for BAN logic and apply the results to the Needham-Schroeder protocol. The paper concludes by discussing the merits of these results and mentioning some open problems.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127193044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Realisation of the Bell-LaPadula security policy in an OSI-distributed system using asymmetric and symmetric cryptographic algorithms 使用非对称和对称密码算法实现osi分布式系统中的Bell-LaPadula安全策略
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236778
J. Verschuren, R. Govaerts, J. Vandewalle
This article discusses a distributed implementation of the Bell-LaPadula security policy model. Implementation of a confidentiality service in the OSIRM is not sufficient for enforcing the Bell-LaPadula model. Also integrity services are necessary. In this article both public key systems (PKSs) as well as symmetric cryptographic systems are considered for the realisation of these security services. By concentrating on the key distribution, no cryptographic algorithms or protocols are excluded on beforehand. It is investigated how key-distributions can be found resulting in a minimum number of keys. Application of PKSs results in a key distribution which requires less keys than key-distributions going with the use of a symmetric system. Moreover, practical or viable key-distributions going with symmetric algorithms turn out to be more sensitive to the disclosure of a secret key than key-distributions going with PKSs. A combination of a PKS and a symmetric system is indicated which does not suffer from the disadvantages going with the use of symmetric systems alone.<>
本文讨论了Bell-LaPadula安全策略模型的分布式实现。在OSIRM中实现机密性服务不足以强制执行Bell-LaPadula模型。此外,完整性服务也是必要的。在本文中,为了实现这些安全服务,我们考虑了公钥系统(pki)和对称加密系统。通过专注于密钥分发,事先没有排除任何加密算法或协议。本文研究了如何找到导致最小键数的键分布。pki的应用导致密钥分发比使用对称系统的密钥分发需要更少的密钥。此外,与使用pki的密钥分发相比,使用对称算法的实际或可行的密钥分发对秘密密钥的泄露更为敏感。指出了PKS和对称系统的组合,它不会遭受单独使用对称系统所带来的缺点。
{"title":"Realisation of the Bell-LaPadula security policy in an OSI-distributed system using asymmetric and symmetric cryptographic algorithms","authors":"J. Verschuren, R. Govaerts, J. Vandewalle","doi":"10.1109/CSFW.1992.236778","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236778","url":null,"abstract":"This article discusses a distributed implementation of the Bell-LaPadula security policy model. Implementation of a confidentiality service in the OSIRM is not sufficient for enforcing the Bell-LaPadula model. Also integrity services are necessary. In this article both public key systems (PKSs) as well as symmetric cryptographic systems are considered for the realisation of these security services. By concentrating on the key distribution, no cryptographic algorithms or protocols are excluded on beforehand. It is investigated how key-distributions can be found resulting in a minimum number of keys. Application of PKSs results in a key distribution which requires less keys than key-distributions going with the use of a symmetric system. Moreover, practical or viable key-distributions going with symmetric algorithms turn out to be more sensitive to the disclosure of a secret key than key-distributions going with PKSs. A combination of a PKS and a symmetric system is indicated which does not suffer from the disadvantages going with the use of symmetric systems alone.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The expressive power of multi-parent creation in monotonic access control models 单调访问控制模型中多父创建的表达能力
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236780
P. Ammann, R. Lipton, R. Sandhu
Formal demonstration of equivalence or nonequivalence of different security models helps identify the fundamental constructs and principles in such models. The authors demonstrate the nonequivalence of two monotonic access control models that differ only in the creation operation for new subjects and/or objects; in particular, they show that single-parent creation is less expressive than multi-parent creation in monotonic models. The paper also demonstrates that in nonmonotonic models, multi-parent creation can be reduced to single-parent creation, thereby neutralizing the difference in expressive power. The nonequivalence proof is carried out on an abstract access control model, following which the results are interpreted in standard formulations. In particular, they apply the results to demonstrate nonequivalence of the schematic protection model (SPM) and the extended schematic protection model (ESPM). They also show how the results apply to the typed access matrix model (TAM).<>
对不同安全模型的等价或不等价的正式演示有助于识别这些模型中的基本构造和原则。作者证明了两种单调访问控制模型的不等价性,它们只是在对新主体和/或对象的创建操作上有所不同;特别是,它们表明,在单调模型中,单亲创建比多父创建更缺乏表现力。本文还证明了在非单调模型中,多父创作可以简化为单亲创作,从而抵消了表达能力的差异。在一个抽象的访问控制模型上进行了非等价性证明,然后用标准公式解释了结果。特别地,他们应用结果证明了原理图保护模型(SPM)和扩展原理图保护模型(ESPM)的不等价性。他们还展示了如何将结果应用于类型化访问矩阵模型(TAM)
{"title":"The expressive power of multi-parent creation in monotonic access control models","authors":"P. Ammann, R. Lipton, R. Sandhu","doi":"10.1109/CSFW.1992.236780","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236780","url":null,"abstract":"Formal demonstration of equivalence or nonequivalence of different security models helps identify the fundamental constructs and principles in such models. The authors demonstrate the nonequivalence of two monotonic access control models that differ only in the creation operation for new subjects and/or objects; in particular, they show that single-parent creation is less expressive than multi-parent creation in monotonic models. The paper also demonstrates that in nonmonotonic models, multi-parent creation can be reduced to single-parent creation, thereby neutralizing the difference in expressive power. The nonequivalence proof is carried out on an abstract access control model, following which the results are interpreted in standard formulations. In particular, they apply the results to demonstrate nonequivalence of the schematic protection model (SPM) and the extended schematic protection model (ESPM). They also show how the results apply to the typed access matrix model (TAM).<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132944190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Attribute support for inter-domain use 支持域间使用的属性
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236777
M. Zurko
This paper describes the user attribute service (UAS), a tool providing the storage and management of application-specific per-user security attributes for applications running in a distributed environment. The UAS provides for the security and integrity of attribute-to-user bindings, as well as the secrecy of those bindings, if the application or user requests it. Four goals of the UAS are support of least privilege, local control and autonomy, instantiation of trust relationships, and psychological acceptability. Mechanisms to group and enable privilege attributes support the least privilege principal at the user request level. Functions are designed to enhance the usability of the UAS within and across domains by attribute holders and security managers.<>
本文描述了用户属性服务(UAS),这是一种为运行在分布式环境中的应用程序提供特定于应用程序的每用户安全属性的存储和管理的工具。如果应用程序或用户请求,UAS提供属性到用户绑定的安全性和完整性,以及这些绑定的保密性。UAS的四个目标是支持最小特权、局部控制和自治、信任关系的实例化和心理可接受性。对特权属性进行分组和启用特权属性的机制在用户请求级别支持最小特权主体。功能的设计是为了增强属性持有者和安全管理器在域内和跨域的UAS的可用性
{"title":"Attribute support for inter-domain use","authors":"M. Zurko","doi":"10.1109/CSFW.1992.236777","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236777","url":null,"abstract":"This paper describes the user attribute service (UAS), a tool providing the storage and management of application-specific per-user security attributes for applications running in a distributed environment. The UAS provides for the security and integrity of attribute-to-user bindings, as well as the secrecy of those bindings, if the application or user requests it. Four goals of the UAS are support of least privilege, local control and autonomy, instantiation of trust relationships, and psychological acceptability. Mechanisms to group and enable privilege attributes support the least privilege principal at the user request level. Functions are designed to enhance the usability of the UAS within and across domains by attribute holders and security managers.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132213991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Foundations of intrusion detection (computer security) 入侵检测基础(计算机安全)
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236783
P. Helman, G. Liepins, Wynette Richards
Computer use is modeled as a mixture of two stochastic processes, normal and misuse. Intrusion detection is formally defined as identifying those transactions generated by the misuse process. Bounds for detection performance are derived in terms of the ratios of the densities of the processes at the individual transactions. It is shown that any optimal intrusion detection system must rank transaction suspicion consistently with these ratios. Sparsity of data requires that transactions be grouped into equivalence classes that preserve the order of the true ratio ranking and reduce the number of singleton and unobserved transactions. Results are described that demonstrate that in general this 'singleton reduction' problem is NP-hard.<>
计算机的使用被建模为正常和误用两个随机过程的混合。入侵检测被正式定义为识别那些由误用过程产生的事务。检测性能的界限是根据单个事务中进程密度的比率推导出来的。结果表明,任何最优的入侵检测系统都必须与这些比率保持一致。数据的稀疏性要求将事务分组到保持真实比率排序的等价类中,并减少单例和未观察到的事务的数量。结果表明,一般来说,这种“单态约简”问题是np困难的。
{"title":"Foundations of intrusion detection (computer security)","authors":"P. Helman, G. Liepins, Wynette Richards","doi":"10.1109/CSFW.1992.236783","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236783","url":null,"abstract":"Computer use is modeled as a mixture of two stochastic processes, normal and misuse. Intrusion detection is formally defined as identifying those transactions generated by the misuse process. Bounds for detection performance are derived in terms of the ratios of the densities of the processes at the individual transactions. It is shown that any optimal intrusion detection system must rank transaction suspicion consistently with these ratios. Sparsity of data requires that transactions be grouped into equivalence classes that preserve the order of the true ratio ranking and reduce the number of singleton and unobserved transactions. Results are described that demonstrate that in general this 'singleton reduction' problem is NP-hard.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125176475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Causal security (computer systems) 因果安全(计算机系统)
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236788
M. Mowbray
This paper gives a new definition of security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent systems for which high-level information may be either input into the system during its operation, or inherent in the original state of the system. It is possible to have systems which are secure under this definition which write to audit before performing each transition. The definition satisfies several useful composition properties, including one which gives it some protection from Trojan horse attacks.<>
本文给出了考虑因果信息的安全的新定义。新定义可用于确定非确定性并发系统的安全性,其中高级信息可能在系统运行期间输入到系统中,也可能在系统的原始状态中固有。在这个定义下,有可能有安全的系统在执行每次转换之前写入审计。该定义满足了几个有用的组合属性,其中一个属性使其免受特洛伊木马攻击。
{"title":"Causal security (computer systems)","authors":"M. Mowbray","doi":"10.1109/CSFW.1992.236788","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236788","url":null,"abstract":"This paper gives a new definition of security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent systems for which high-level information may be either input into the system during its operation, or inherent in the original state of the system. It is possible to have systems which are secure under this definition which write to audit before performing each transition. The definition satisfies several useful composition properties, including one which gives it some protection from Trojan horse attacks.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114601978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for composition of security models 用于组合安全模型的框架
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236779
J. Landauer, T. Redmond
The authors present an abstract framework for composing models of system components. The abstract presentation is designed to be applicable to a very wide range of models of computation. They introduce a restricted model of computation and develop techniques that are useful for composing security models for modular systems. They include a small example of a composed security model.<>
作者提出了一个组成系统组件模型的抽象框架。抽象的表示被设计成适用于非常广泛的计算模型。他们引入了一种受限制的计算模型,并开发了用于组合模块化系统安全模型的技术。它们包括一个组合安全模型的小示例。
{"title":"A framework for composition of security models","authors":"J. Landauer, T. Redmond","doi":"10.1109/CSFW.1992.236779","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236779","url":null,"abstract":"The authors present an abstract framework for composing models of system components. The abstract presentation is designed to be applicable to a very wide range of models of computation. They introduce a restricted model of computation and develop techniques that are useful for composing security models for modular systems. They include a small example of a composed security model.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126982274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
[1992] Proceedings The Computer Security Foundations Workshop V
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1