首页|Threat-Based Declassification and Endorsement for Mobile Computing
Threat-Based Declassification and Endorsement for Mobile Computing
扫码查看
点击上方二维码区域,可以放大扫码查看
原文链接
NETL
NSTL
万方数据
维普
Declassification and endorsement can efficiently improve the usability of mobile applications.However,both declassify and endorse operations in practice are often ad-hoc and nondeterministic,thus,being insecure.From a new perspective of threat assessments,we propose the Threat-based typed security π-calculus (πTBTS) to model declassification and endorsement in mobile computing.Intuitively,when relaxing confidentiality policies and/or integrity policies,we respectively assess threats brought by performing these two relaxes.If these threats are acceptable,the declassification and/or endorsement operations are permitted;Otherwise,they are denied.The proposed assessments have explicit security conditions,results and less open parameters,so our approach solves the problem of the ad-hoc and nondeterministic semantics and builds a bridge between threat assessments and declassification/endorsement.
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
The State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China
Guangxi Key Lab of Trusted Software, Guilin University of Electronic Technology, Guilin 54100, China
The National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing 100029, China
展开 >
This work is supported by the National High Technology Research and Development ProgramNational Natural Science Foundation of ChinaNational Natural Science Foundation of ChinaGuangxi Natural Science Foundation