Policy-adaptive capability inheritance algorithm consistent with POSIX standard
|更新时间:2024-10-14
|
Policy-adaptive capability inheritance algorithm consistent with POSIX standard
Issue 2, Pages: 66-72(2006)
作者机构:
1. 中国科学院软件研究所信息安全技术工程研究中心
2. 中国科学院软件研究所信息安全技术工程研究中心,北京,100080
3. 中国科学院研究生院
4. ,北京,100039
作者简介:
基金信息:
DOI:
CLC:TP18
Published:2006
稿件说明:
移动端阅览
SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, et al. Policy-adaptive capability inheritance algorithm consistent with POSIX standard[J]. 2006, (2): 66-72.
DOI:
SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, et al. Policy-adaptive capability inheritance algorithm consistent with POSIX standard[J]. 2006, (2): 66-72.DOI:
Policy-adaptive capability inheritance algorithm consistent with POSIX standard
摘要
多数支持POSIX权能机制的安全操作系统提出了各自的权能遗传算法
但这些算法都只适用于特定的最小特权控制策略
并且存在语义冲突、安全目标不明确等问题
不能有效支持多种安全需求不同的特权策略。通过对一些现有算法的深入分析
提出了一种新的权能遗传算法
该算法引入策略关联的权能控制变量以及可信应用属性。实例分析表明本算法具有策略适应性和可用性
形式化分析和验证表明它可使系统满足特权策略的基本安全定理。
Abstract
In order to support POSIX capability mechanism
many secure operating systems provided individual capability inheritable algorithms.These algorithms were only applicable to specified least privilege control policies
and had such defects as semantic conflicts and no defined security-objectives.So they couldn’t flexibly support for implementing diversified privilege policies for different requirements.Based on the analysis of some existing algorithms
a new capability inheritance algorithm was proposed
which introduced the policy-relevant capability control variable and the trusted application attribution.The implementation of the algorithm in ANSHENG secure operating system demonstrates that this algorithm provides such properties as policy-adaptability and usability
the formal analysis and verification of this algorithm proves that it supports a secure operating system to meet basic security theorems of the privilege policies enforced in it.