首页|Threat-Based Declassification and Endorsement for Mobile Computing

Threat-Based Declassification and Endorsement for Mobile Computing

扫码查看
Declassification and endorsement can efficiently improve the usability of mobile applications.However,both declassify and endorse operations in practice are often ad-hoc and nondeterministic,thus,being insecure.From a new perspective of threat assessments,we propose the Threat-based typed security π-calculus (πTBTS) to model declassification and endorsement in mobile computing.Intuitively,when relaxing confidentiality policies and/or integrity policies,we respectively assess threats brought by performing these two relaxes.If these threats are acceptable,the declassification and/or endorsement operations are permitted;Otherwise,they are denied.The proposed assessments have explicit security conditions,results and less open parameters,so our approach solves the problem of the ad-hoc and nondeterministic semantics and builds a bridge between threat assessments and declassification/endorsement.

DeclassificationEndorsementThreat assessmentMobile computingπ-Calculus

YIN Lihua、GUO Yunchuan、ZHANG Huibing、HUANG Wenting、FANG Binxing

展开 >

Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China

The State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China

Guangxi Key Lab of Trusted Software, Guilin University of Electronic Technology, Guilin 54100, China

The National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing 100029, China

展开 >

This work is supported by the National High Technology Research and Development ProgramNational Natural Science Foundation of ChinaNational Natural Science Foundation of ChinaGuangxi Natural Science Foundation

2015AA01600761672515616620132017GXNSFAA198372

2019

中国电子杂志(英文版)

中国电子杂志(英文版)

CSTPCDCSCDSCIEI
ISSN:1022-4653
年,卷(期):2019.28(5)
  • 30