A security verification method for information flow security policies implemented in operating systems

1Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, operating system security depends much on the security policies implemented in the system. It's necessary to verify whether the secure operating system's implementation of security policies is correct. The paper provides a general and automaticable security verification method which is suitable for deploying in practice to verify information flow security policies implemented in information systems specially in secure operating systems. We first use information flow graphs (IFG) to express the information flow security policies specified by temporal logic. Then, based on the express method, we supply a verification framework to verify whether the implementation of an information system satisfies the restrictions of security policies. At last, a security verification framework based on mandatory access control (MAC) which is fit for current secure operating systems has been given. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Yi, X. D., & Yang, X. J. (2003). A security verification method for information flow security policies implemented in operating systems. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2836, 280–291. https://doi.org/10.1007/978-3-540-39927-8_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free