DocumentCode :
2748309
Title :
Information-flow analysis for covert-channel identification in multilevel secure operating systems
Author :
He, Jingsha ; Gligor, Virgil D.
Author_Institution :
Dept. of Electr. Eng., Maryland Univ., College Park, MD, USA
fYear :
1990
fDate :
12-14 Jun 1990
Firstpage :
139
Lastpage :
148
Abstract :
Given an information flow consisting of the flow path and the flow condition under which the flow takes place, the problem of determining whether the information flow is legal is considered; that is, whether the flow complies with the underlying nondiscretionary security policy of a trusted computing base (TCB). It is shown that the proposed approach to information-flow analysis has the advantage of eliminating the possibility of generating false illegal flow, namely flows that are identified by the analysis process to be illegal but which, in reality, are legal. Without eliminating false illegal flows from analysis, automated tools for secure information-flow analysis would be of limited use in this area because manual work would still be needed. Finally, it is shown how to apply this information-flow analysis approach to Secure XENIX and how information-flow analysis can help reduce the amount of effort for information-flow integration within TCB programs
Keywords :
operating systems (computers); security of data; Secure XENIX; covert-channel identification; flow condition; flow path; illegal flow; information flow; information-flow analysis; multilevel secure operating systems; nondiscretionary security policy; trusted computing base; Computer interfaces; Educational institutions; Information analysis; Information security; Law; Legal factors; Operating systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop III, 1990. Proceedings
Conference_Location :
Franconia, NH
Print_ISBN :
0-8186-2071-4
Type :
conf
DOI :
10.1109/CSFW.1990.128194
Filename :
128194
Link To Document :
بازگشت