期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
XEN Virtual Machine Technology and Its Security Analysis 被引量:5
1
作者 XUE Haifeng qing sihan ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期159-162,共4页
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The secur... This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future. 展开更多
关键词 virtual machine XEN SECURITY
在线阅读 下载PDF
A Kind of Multi-party Non-repudiation Protocol with Consistent Evidence
2
作者 Liu Dongmei qing sihan 《China Communications》 SCIE CSCD 2009年第4期88-96,共9页
With development of electronic com-merce,non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions.Comparing with lots of work on two-party non-repudiation,t... With development of electronic com-merce,non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions.Comparing with lots of work on two-party non-repudiation,there are less work on multi-party non-repudiation protocol.Multi-party protocol is more complex and facing more challenge of collusion attack.In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence.Consistent evidence is a property that can not only simplify the process of disputation resolving,but also make the service more friendly to users,which means that whether or not TTP involves,evidences participants obtained are consistent.In the meanwhile we analyze the collusion attack that multi-party protocol facing,our protocol can prevent collusion attack. 展开更多
关键词 multi-party fair non-repudiation protocol consistent evidence collusion attack freehess FAIRNESS
在线阅读 下载PDF
A formal model of fair exchange protocols 被引量:9
3
作者 qing sihan LI Gaicheng 《Science in China(Series F)》 2005年第4期499-512,共14页
Based on the study of existing fair exchange protocols,this paper sets up an accurate formal model by stepwise refinement.In the process of refinement an unreliable channel is employed to simulate an attack behavior.T... Based on the study of existing fair exchange protocols,this paper sets up an accurate formal model by stepwise refinement.In the process of refinement an unreliable channel is employed to simulate an attack behavior.The model provides a novel formal definition of exchanged items,and presents the formal goals for fairness,accountability,etc.,reflecting the inherent requirements for fair exchange protocols across-the-board.In order to check,prove,and design fair exchange protocols effectively and efficiently,the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols,gives a formal definition for trust strand of the third party,and presents general criteria of designing a secure and effective fair exchange protocol.Taking a typical fair exchange protocol as an example,this paper presents the analysis steps of fair exchange protocols appealing to our model.An unknown attack is uncovered.The analysis reveals the process of a complete attack,discovering deeper reasons for causing an attack.Finally,we modify the flawed protocol and the revised protocol ensures the desirable properties. 展开更多
关键词 EVENTS local causal relation local temporal relation global relation exchanged item security goals.
原文传递
A formal model for integrity protection based on DTE technique 被引量:4
4
作者 JI qingguang qing sihan HE Yeping 《Science in China(Series F)》 2006年第5期545-565,共21页
In order to provide integrity protection for the secure operating system to satisfy the structured protection class' requirements, a DTE technique based integrity protection formalization model is proposed after the ... In order to provide integrity protection for the secure operating system to satisfy the structured protection class' requirements, a DTE technique based integrity protection formalization model is proposed after the implications and structures of the integrity policy have been analyzed in detail. This model consists of some basic rules for configuring DTE and a state transition model, which are used to instruct how the domains and types are set, and how security invariants obtained from initial configuration are maintained in the process of system transition respectively. In this model, ten invariants are introduced, especially, some new invariants dealing with information flow are proposed, and their relations with corresponding invariants described in literatures are also discussed. The thirteen transition rules with well-formed atomicity are presented in a well-operational manner. The basic security theorems correspond to these invariants and transition rules are proved. The rationalities for proposing the invariants are further annotated via analyzing the differences between this model and ones described in literatures. At last but not least, future works are prospected, especially, it is pointed out that it is possible to use this model to analyze SE-Linux security. 展开更多
关键词 formal model integrity policy information flow DOMAIN type.
原文传递
Design of secure operating systems with high security levels 被引量:4
5
作者 qing sihan SHEN ChangXiang 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments.Based on the requirements of the relevant national and... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments.Based on the requirements of the relevant national and international standards and criteria,in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level(hereafter simply referred to as ANSHENG OS),this paper addresses the following key issues in the design of secure operating systems with high security levels:security architecture,security policy models,and covert channel analysis.The design principles of security architecture and three basic security models:confidentiality,integrity,and privilege control models are discussed,respectively.Three novel security models and new security architecture are proposed.The prominent features of these proposals,as well as their applications to the ANSHENG OS,are elaborated.Cover channel analysis(CCA)is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach.In order to resolve the fundamental difficulties of CCA,we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method.The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
Formal analysis and design of multi-party fair exchange protocols
6
作者 qing sihan LI Gaicheng 《Science in China(Series F)》 2006年第2期155-174,共20页
Based on the origin of message items and channel combination between transacting parties,and events and relations among events,this paper presents a concise,precise,and hierarchical model for general fair exchange pro... Based on the origin of message items and channel combination between transacting parties,and events and relations among events,this paper presents a concise,precise,and hierarchical model for general fair exchange protocols,formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously,and partition these security requirements with fine granularity.This work helps analyze,debug,and design multi-party fair exchange protocols more effectively and elaborately. 展开更多
关键词 fair exchange logical protocol formal model security requirement
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部