文档详情

Applications of Logic in Computer Security:逻辑在计算机安全中的应用.ppt

发布:2024-09-11约1.07万字共21页下载文档
文本预览下载声明

ApplicationsofLogicinComputerSecurityJonathanMillenSRIInternational

AreasofApplicationMultilevelOperatingSystemSecurity“OrangeBook,”CommercialTrustedProductEvaluation,A1-levelEmphasisonsecrecy,security/clearancelevelsAccessControlPoliciesDiscretionaryorrole-basedpoliciesEmphasisonapplication-specificpolicies,integrityPublic-KeyInfrastructureandTrustManagementNetworkanddistributedsystemsecurityDigitallysignedcertificatesforidentityandprivilegesCryptographicAuthenticationProtocolsFornetworkcommunicationconfidentialityandauthenticationOtherareas:databases,firewalls/routers,intrusiondetectionComputerSecurityNetworkSecurity

ContributionsofLogicUndecidabilityResultsSafetyproblemfordiscretionaryaccesscontrolCryptographicprotocolanalysisTheoremProvingEnvironmentsVerifyingcorrectnessofformalOSspecificationsInductiveproofsofcryptographicprotocolsLogicProgrammingPrologprogramsforcryptographicprotocolanalysis,trustmanagementModelCheckingForcryptographicprotocolanalysisSpecializedLogicsForcryptographicprotocolanalysis,trustmanagement

MultilevelOperatingSystemSecurityMotivatedbyprotectionofclassifiedinformationinsharedsystemsHigh-assurance(A1)systemsmayprotectSecretdatafromunclearedusersArchitecture:trustedOSkernel,hardwaresupportAbstractsystemmodelofaccesscontrol:Bell-LaPadula(ca.1975)Structuredstate-transitionsystem:subject-objectaccessmatrix,levelsSecurityinvariantsandtransitionrules(forOSfunctions)“FormalTop-LevelSpecification”(FTLS)Moredetailedstate-transitionsystemFormalProofs:ModeltransitionssatisfyinvariantsFTLSisaninterpretationofthesystemmodelCarriedoutinenvironmentslikeGypsy,FDM,HDMSomeFTLSerrorsreflectedincodewerediscoveredOfHistoricalInterest

AccessControlPoliciesSafetyProblemSubject-object-rightsmatrix“rights”werearbitrary,representingdifferentkindsofaccessOperations:create/dele

显示全部
相似文档