Journal on Communications ›› 2015, Vol. 36 ›› Issue (9): 193-203.doi: 10.11959/j.issn.1000-436x.2015151

• academic paper • Previous Articles     Next Articles

Formal modeling and analyzing method for database security policy

Rong WANG1,2,Min ZHANG1,3,Deng-guo FENG1,Hao LI1   

  1. 1 Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China
    2 University of Chinese Academy of Sciences,Beijing 100190,China
    3 State Key Laboratory of Computer Science,Institute of Software,ChineseAcademy of Sciences,Beijing 100190,China
  • Online:2015-09-25 Published:2017-09-15
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China

Abstract:

Because of the high-level abstraction,insufficient description of database states and constraints,it was difficult to find the tiny flaws in design and implementation.Based on PVS,a method for formal description and analysis of data-base security policy was proposed,which was more close to the actual database,more widely used in reality,and more complete in describing the safe properties,more extendible of the model,and ensure the efficiency of modeling and veri-fication.Finally,this method is applied in the security policy modeling and analyzing of BeyonDB,which is a commer-cial database,find some security risks in the system design,and thereby verify its effectiveness.

Key words: formal modeling, database, theorem proving, security policy mode

No Suggested Reading articles found!