网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (3): 52-67.doi: 10.11959/j.issn.2909-109x.2016.00038

• 学术论文 • 上一篇    下一篇

基于PAT的使用控制模型的形式化规约与安全性分析

周从华(),陈伟鹤,刘志锋   

  1. 江苏大学计算机科学与通信工程学院,江苏 镇江 212013
  • 修回日期:2016-03-05 出版日期:2016-12-01 发布日期:2016-04-20
  • 作者简介:周从华(1978-),男,江苏盐城人,博士,江苏大学副教授,主要研究方向为访问控制、形式化方法。|陈伟鹤(1974-),男,江苏丹阳人,博士,江苏大学副教授,主要研究方向为访问控制、数据挖掘。|刘志锋(1981-),男,江苏无锡人,博士,江苏大学副教授,主要研究方向为访问控制、形式化方法。
  • 基金资助:
    国家自然科学基金资助项目(61300228)

Formal specification and security verification of usage control model based on PAT

Cong-hua ZHOU(),Wei-he CHEN,Zhi-feng LIU   

  1. School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang 212013, China
  • Revised:2016-03-05 Online:2016-12-01 Published:2016-04-20
  • Supported by:
    The National Natural Science Foundation of China(61300228)

摘要:

使用控制模型UCON是高度分布式、网络化的异构开放式计算环境下实现数字资源保护的新型访问控制模型。首先,利用态式时间进程代数 TCSP#建立了每个 UCON 核模型的形式化规约,以及针对一般化UCON的组合规约机制。其次,提出了各种基于单会话的进程组合机制,实现了复杂并发会话、时间控制与非确定性的形式化规范,从而使组合进程的可达空间即为所求空间。最后,提出了基于可达空间的UCON安全性分析方法,以及基于进程代数等价的控制规则冲突性分析方法。所有的工作都已在PAT上实现,表明所提方法是切实可行的,同时也为UCON的形式化规范与安全性验证寻找到了一个合适的工具。

关键词: UCON, 形式化规约, 安全性分析, 模型检测

Abstract:

Usage control (UCON) is an access control model to enforce digital resources protection in highly distributed, heterogeneous network computing environment. Firstly, each core model of UCON was specified formally with TCSP#, and a combination specification mechanism was proposed for general UCON. Secondly, as the basis of the security analysis, the concepts and calculation method of the reachable space were given. Various combination mechanisms of processes based on single-session was presented to achieve formal specifications of complex concurrent sessions, timings and nondeterminism. Then the reachable space of combined processes was the desired space. Finally, the security analysis method based on the reachable space and the conflict analysis of access control policies based on the equivalent checking in process algebras were proposed for UCON model. All the proposed work had been formal checked in PAT. The experiment result shows that the proposed approaches are feasible, and PAT is a really great tool for the systematic formal specification and security analysis of UCON.

Key words: UCON, formal specification, security analysis, model checking

中图分类号: 

No Suggested Reading articles found!