期刊文献+

基于模型检测的策略冲突检测方法 被引量:2

Policy Conflict Detection Method Based on Model Checking
在线阅读 下载PDF
导出
摘要 提出一种基于模型校验的策略冲突检测新方法。首先通过形式化描述语言进行系统建模,采用时态逻辑表征策略冲突的系统属性,然后利用NuSMV模型检测器验证属性的可满足性,并根据模型检测器产生的反例轨迹追溯策略冲突点。该方法可提高策略冲突检测的效率。 A new policy conflict detection method is proposed based on model checking. In this method, the model of system is specified with formal description language, the properties of system depending on different types of policy conflicts is represented with temporal logic, and the violations of properties is detected by using NuSMV model checker, which can provide the counterexample and trace it back to the policy conflict point. The result shows that the method can improve the efficiency of policy conflict detection.
作者 吴丹 危胜军
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2013年第5期745-748,768,共5页 Journal of University of Electronic Science and Technology of China
基金 国家863项目(2009AA01Z433)
关键词 反例 模型检测 NUSMV 策略冲突 counterexample model checking NuSMV policy conflict
作者简介 吴丹(1983-),男,博士,主要从事多级安全策略与网络安全方面的研究.
  • 相关文献

参考文献3

二级参考文献51

  • 1季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 2李祥军,邱雪松,孟洛明.基于策略的网管中策略条件“或”运算的问题及解决方法[J].计算机工程与应用,2005,41(12):1-4. 被引量:1
  • 3Tidswell J E, Jaeger T. An access control model for simplifying constraint expression//Proceedings of the 7th ACM Conference on Computer and Communications Security. Athens, Greece, 2000:154-163
  • 4Koch M, Parisi-Presicce F. Visual specifications of policies and their verification//Proceedings of the Workshop on Fundamental Approaches to Software Engineering. Barcelona, Spain, LNCS 2621. 2003:278-293
  • 5Arnaud Dury, Boroday Sergiy, Petrenko Alexandre, Lotz Volkmar. Formal verification of business workflows and role based access control systems//Proceedings of the Interna tional Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007). Valencia, Spain, 2007:201- 210
  • 6中华人民共和国国家标准.计算机信息系统安全保护等级划分准则.中国国家质量技术监督局,1999年9月13日发布,2001年1月1日实施.
  • 7Park Sachoun, Kwon Gihwon. Verification of UML-based security policy model//Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005). Singapore, 2005:973-982
  • 8Jackson D. Alloy: A lightweight object modeling notation. ACM Transactions on Software Engineering and Methodology, 2002, 11(2): 256-290
  • 9Riehters M, Gogolla M. Validating UML models and OCL constraints//Proceedings of the 3rd International Conference on the Unified Modeling Language (UML 2000). York, UK, 2000:265-277
  • 10Hu Hongxin, Ahn Gail-Joon. Enabling verification and conformance testing for access control model//Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT). Estes Park, Colorado, USA, 2008: 195-204

共引文献46

同被引文献23

  • 1LOIZOS M, DAVID P C, PFEFFER A. Specifying and monitoring economic environments using rights and obligations[J]. Autonomous Agents and Multi-Agent Systems, 2010, 20(2): 158-197.
  • 2XU Dian-xiang, SANFORD M, LIU Zhao-liang. Testing access control and obligation policies[C]//Intemational Conference on Computing, Networking and Communications. San Diego, CA , USA: IEEE Computer Society, 2013: 540-544.
  • 3BALDONI M, BAROGLIO C. Constitutive and regulative specifications of commitment protocols: a decoupled approach[J]. Acm Transactions on Intelligent Systems and Technology, 2013, 4(2): 1-25.
  • 4MINSKY N H, ROZENSHTEIN D. A law-based approach to object-oriented programming[C]//Proceedings on Object- Oriented Programming Systems, Languages and Applications. New York, NY, USA: Applied Intelligence, 1987: 482-493.
  • 5M1NSKY N H, UNGUREANU V. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems[J]. ACM Transactions on Software Engineering Methodology, 2000, 9(3): 273-305.
  • 6FORNARA N, COLOMBETTI M. Specifying and enforcing norms in artificial institutions: a retrospective review[C]// Proceedings of the 9th International Workshop on Declarative Agent Languages and Technologies. Taipei, Taiwan, China: Springer, 2012: 117-119.
  • 7EI-MENSHAWY M, BENTAHAR J. Reducing model checking commitments for agent communication to model checking ARCTL and GCTL[J]. Autonomous Agents and Multi-Agent Systems, 2013, 27(3): 375-418.
  • 8YOLUM A P. Constraint satisfaction as a tool for modeling and checking feasibility of multiagent commitments[J]. Applied Intelligence, 2013, 39(3): 489-509.
  • 9DOUGHERTY D J, FISLER K, KRISHNAMURTHI S. Obligations and their interaction with programs[C]// Proceedings of 12th European Symposium on Research in Computer Security. Dresden, Germany: Springer, 2007: 375-389.
  • 10CRAVEN R, LOBO J, MA J, et al. Expressive policy analysis with enhanced system dynamicity[C]// Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. New York, USA: Association for Computing Machinery, 2009: 239-250.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部