• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学

• 论文 • 上一篇    下一篇

基于限界约束的安全相关性质的推理证明

龙腾1,2,许智武3   

  1. (1.中国地质大学(北京)信息工程学院,北京 100083;2.中国科学院软件研究所计算机科学国家重点实验室,北京 100190;
    3.深圳大学计算机与软件学院,广东 深圳 518060)
  • 收稿日期:2016-12-17 修回日期:2017-02-20 出版日期:2017-04-25 发布日期:2017-04-25
  • 基金资助:

    中央高校基本科研业务费(2-9-2014-011);国家自然科学基金(61502308)

Deductive proof of security-relevant
properties under bounded constraints

LONG Teng1,2,XU Zhi-wu3   

  1. (1.School of Information Engineering,China University of Geosciences,Beijing 100083;
    2.State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,Beijing 100190;
    3.College of Computer Science and Software Engineering,Shenzhen University,Shenzhen 518060,China)
     
  • Received:2016-12-17 Revised:2017-02-20 Online:2017-04-25 Published:2017-04-25

摘要:

安全相关的性质如访问控制等在复杂环境下有十分重要的作用。从程序验证方面来说,不仅考虑安全性和活性的验证,还要考虑一些安全策略的性质,如非干涉性,这些不能用一般的性质来描述的安全策略可以被看作“超安全性质”。限界约束可通用地表示不同程度的访问频次限制,是安全相关性质验证中有效的辅助方法之一,在无线传感器网络协议、嵌入式系统等重要领域的性质验证方面具有广泛的应用价值。主要研究网络安全策略中的安全相关性质的限界表达及基于该限界约束的验证规则。

关键词: 限界约束, 超安全性, 安全策略, 推理证明

Abstract:

Security-relevant properties such as access control in a complex environment play a very important role. In terms of procedural verification, not only the safety and activity verification are considered, but the nature of some security policies, such as non-interference, should also be considered. These security policies that cannot be described by the general nature can be considered as “hypersafety”. Boundary constraints are common to represent different degrees of access frequency restrictions. They are one of the effective auxiliary methods in safety-related property verification, and have wide application value in the attribute verification of wireless sensor network protocols, embedded systems and other important fields. Based on the above description, we propose an approach for extracting deductive proof of security-relevant properties under bounded constraints.

Key words: bounded constraints, hypersafety, security-relevant properties, deductive proof