Title :
An Information Flow Security Model to Trusted Computing System
Author :
Jun, Hu ; Changxiang, Shen
Author_Institution :
Graduate Sch. of Chinese Acadamy of Sci., Beijing
Abstract :
In this paper, we introduce a new information flow model for trusted computing systems.Different from traditional system protection models, such as access control matrix model, this model analyze the information flow in the system by tracing the operation sequences , and explains that the security status of a trusted computing system is the security attributes of information flows from input port to output port.With this model, we discuss the information channels in a trusted computing systems, and propose a "normal information flow theorem" which gives a necessary condition of the existence of normal information flow.
Keywords :
matrix algebra; security of data; access control matrix model; information flow security model; normal information flow theorem; system protection models; trusted computing system; Access control; Data flow computing; Data privacy; Data security; Educational institutions; Information analysis; Information security; Laboratories; Protection; Terminology;
Conference_Titel :
Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3016-1
DOI :
10.1109/ISDPE.2007.114