首页 > 最新文献

[1992] Proceedings The Computer Security Foundations Workshop V最新文献

英文 中文
On requirements and security in a CCIS 关于CCIS中的需求和安全性
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236782
C. O'Halloran
Any foundation for computer security needs to be tested to see whether it is strong enough to support a useful theory. In this paper a case study is presented which illustrates a particular foundation for confidentiality. A natural language confidentiality requirement is formalized in a calculus of information flow and analysed to assess possible conflicts.<>
任何计算机安全的基础都需要测试,看它是否足够强大,足以支持一个有用的理论。在本文中,提出了一个案例研究,说明了保密的特殊基础。在信息流演算中形式化了自然语言的机密性要求,并对其进行了分析,以评估可能的冲突
{"title":"On requirements and security in a CCIS","authors":"C. O'Halloran","doi":"10.1109/CSFW.1992.236782","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236782","url":null,"abstract":"Any foundation for computer security needs to be tested to see whether it is strong enough to support a useful theory. In this paper a case study is presented which illustrates a particular foundation for confidentiality. A natural language confidentiality requirement is formalized in a calculus of information flow and analysed to assess possible conflicts.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126293098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure dependencies with dynamic level assignments 使用动态级别分配保护依赖关系
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236787
P. Bieber, F. Cuppens
Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical systems, classification of objects may evolve due to declassification and subject current level may evolve according to subject requests. The authors previously proposed a modal logic definition of security whose counterpart is a constraint on the system traces that they called causality. In this paper, they give a generalization of causality which avoids the tranquillity principle. They give an interpretation of their model in the case of a multilevel security policy when the levels can be assigned dynamically. Then they provide efficient conditions to control the dynamic assignment of both the object classification and the subject current level. They propose a comparison of their approach with the nondeducibility generalization. Finally they give several examples of systems where security levels are dynamically assigned.<>
大多数安全模型显式(或隐式)包括禁止更改给定信息的安全级别的宁静原则。然而,在实际系统中,对象的分类可能会因解密而演变,主体当前水平可能会根据主体的要求而演变。作者先前提出了安全的模态逻辑定义,其对应物是对系统轨迹的约束,他们称之为因果关系。在本文中,他们给出了因果关系的概括,避免了宁静原则。在多级安全策略的情况下,当级别可以动态分配时,他们给出了对模型的解释。然后为控制目标分类和主题当前水平的动态分配提供了有效的条件。他们提出了他们的方法与不可演绎概括的比较。最后,他们给出了几个动态分配安全级别的系统示例
{"title":"Secure dependencies with dynamic level assignments","authors":"P. Bieber, F. Cuppens","doi":"10.1109/CSFW.1992.236787","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236787","url":null,"abstract":"Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical systems, classification of objects may evolve due to declassification and subject current level may evolve according to subject requests. The authors previously proposed a modal logic definition of security whose counterpart is a constraint on the system traces that they called causality. In this paper, they give a generalization of causality which avoids the tranquillity principle. They give an interpretation of their model in the case of a multilevel security policy when the levels can be assigned dynamically. Then they provide efficient conditions to control the dynamic assignment of both the object classification and the subject current level. They propose a comparison of their approach with the nondeducibility generalization. Finally they give several examples of systems where security levels are dynamically assigned.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114271814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Some laws of non-interference (CSP algebra) 非干涉性的几个定律(CSP代数)
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236790
John Graham-Cumming
The author defines non-interference in the algebra of CSP; that definition leads to simple proof rules for non-interference concerning, amongst other things, composition of systems exhibiting non-interference. The author works through a case study of a multi-level secure system to illustrate those laws.<>
作者在CSP代数中定义了不干涉;这个定义导致了简单的非干涉证明规则,其中包括表现出非干涉的系统的组成。作者通过一个多级安全系统的案例来说明这些规律。
{"title":"Some laws of non-interference (CSP algebra)","authors":"John Graham-Cumming","doi":"10.1109/CSFW.1992.236790","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236790","url":null,"abstract":"The author defines non-interference in the algebra of CSP; that definition leads to simple proof rules for non-interference concerning, amongst other things, composition of systems exhibiting non-interference. The author works through a case study of a multi-level secure system to illustrate those laws.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115300889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unwinding and the LOCK proof referees study 开卷和锁证明裁判研究
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236791
Sandra Rawlings Murphy, S. D. Crocker, T. Redmond
The LOCK definition of non-interference and the LOCK unwinding theorem provide a method of using a non-interference model in a system with an identified potential for interference. However, the LOCK work is presented in terms specific to the LOCK system. The authors generalize the LOCK definitions and theorems so that they could be used in systems other than LOCK that have specifically identified potentials for interference They state and prove a general winding theorem for this purpose. They also show that the LOCK unwinding theorem follows from their general unwinding theorem.<>
无干扰的LOCK定义和LOCK展开定理提供了在具有确定的干扰潜力的系统中使用无干扰模型的方法。但是,LOCK工作是用LOCK系统特有的术语来表示的。作者推广了LOCK的定义和定理,以便它们可以用于除LOCK以外的具有特定干扰势的系统。他们为此目的陈述并证明了一个一般的缠绕定理。他们还证明了LOCK展开定理是从他们的一般展开定理推导出来的。
{"title":"Unwinding and the LOCK proof referees study","authors":"Sandra Rawlings Murphy, S. D. Crocker, T. Redmond","doi":"10.1109/CSFW.1992.236791","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236791","url":null,"abstract":"The LOCK definition of non-interference and the LOCK unwinding theorem provide a method of using a non-interference model in a system with an identified potential for interference. However, the LOCK work is presented in terms specific to the LOCK system. The authors generalize the LOCK definitions and theorems so that they could be used in systems other than LOCK that have specifically identified potentials for interference They state and prove a general winding theorem for this purpose. They also show that the LOCK unwinding theorem follows from their general unwinding theorem.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128571659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The inference problem for computer security 计算机安全的推理问题
Pub Date : 1992-06-16 DOI: 10.1109/CSFW.1992.236786
T. Garvey
An inference problem in computer security occurs when an individual can infer classified information by viewing only information of strictly lower classification. This paper introduces questions for discussion for the computer security community. These questions are organized into the following areas: definition of the inference problem; requirements for a theory of the inference problem; mechanisms for controlling inference; and practical formulations of inference control. The author believes that investigation of these issues is required in order for progress to be made toward addressing the management of inference in computer security.<>
计算机安全中的一个推理问题是,当一个人只能通过查看严格较低级别的信息来推断机密信息时。本文介绍了供计算机安全界讨论的问题。这些问题被组织成以下几个方面:推理问题的定义;推理问题的理论要求控制推理的机制;以及推理控制的实用公式。作者认为,为了在解决计算机安全中的推理管理方面取得进展,需要对这些问题进行调查。
{"title":"The inference problem for computer security","authors":"T. Garvey","doi":"10.1109/CSFW.1992.236786","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236786","url":null,"abstract":"An inference problem in computer security occurs when an individual can infer classified information by viewing only information of strictly lower classification. This paper introduces questions for discussion for the computer security community. These questions are organized into the following areas: definition of the inference problem; requirements for a theory of the inference problem; mechanisms for controlling inference; and practical formulations of inference control. The author believes that investigation of these issues is required in order for progress to be made toward addressing the management of inference in computer security.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems. II 用于多级安全数据/知识库管理系统的非单调型多级逻辑。2
Pub Date : 1900-01-01 DOI: 10.1109/CSFW.1992.236781
B. Thuraisingham
For pt.I. see Proc. 4th Computer Security Foundations, Franconia, USA (1991). In pt.I the author described a logic called nonmonotonic typed multilevel logic (NTML) for multilevel database applications. They also described various approaches to viewing multilevel databases through NTML. In this paper he continues with his discussion of the applications of NTML. In particular, the use of NTML as a programming language, issues on handling negative information in multilevel databases, and approaches for integrity checking in multilevel database systems are described. His work on NTML will be of significance to multilevel data/knowledge base applications in the same way logic programming has been to the development of data/knowledge base applications.<>
pt.I。参见Proc. 4th Computer Security Foundations, Franconia, USA(1991)。在pt1中,作者描述了一种用于多层数据库应用的非单调类型多层逻辑(NTML)。他们还描述了通过NTML查看多层数据库的各种方法。在本文中,他继续讨论了NTML的应用。特别地,描述了NTML作为编程语言的使用,在多层数据库中处理负面信息的问题,以及在多层数据库系统中完整性检查的方法。他在NTML方面的工作将对多层数据/知识库应用程序具有重要意义,就像逻辑编程对数据/知识库应用程序的开发一样。
{"title":"A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems. II","authors":"B. Thuraisingham","doi":"10.1109/CSFW.1992.236781","DOIUrl":"https://doi.org/10.1109/CSFW.1992.236781","url":null,"abstract":"For pt.I. see Proc. 4th Computer Security Foundations, Franconia, USA (1991). In pt.I the author described a logic called nonmonotonic typed multilevel logic (NTML) for multilevel database applications. They also described various approaches to viewing multilevel databases through NTML. In this paper he continues with his discussion of the applications of NTML. In particular, the use of NTML as a programming language, issues on handling negative information in multilevel databases, and approaches for integrity checking in multilevel database systems are described. His work on NTML will be of significance to multilevel data/knowledge base applications in the same way logic programming has been to the development of data/knowledge base applications.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132828792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
[1992] Proceedings The Computer Security Foundations Workshop V
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1