The Research on Definition of Multilevel Security Based on the Construction of Covert Channels

被引:0
|
作者
Huang, Yong [1 ]
Pan, Xuezeng [2 ]
机构
[1] Guangxi Univ Nationalities, Coll Math & Comp, Nanning, Peoples R China
[2] Zhejiang Univ, Dept Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
来源
2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV | 2010年
基金
美国国家科学基金会;
关键词
Covert channel; multilevel security; trusted domain;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Aiming at the main problem that the link between the formal definition of multilevel security and security goal is not always clear, we propose a new definition of multilevel security closer to the practical application. Due to the fact that separability property based on the construction of covert channels is not practical, we introduce the concept of trusted domain to the theoretical framework initiated by the characteristics of transitive and intransitive security policy. Following that two intuitive propositions with the corresponding proof are proposed.
引用
收藏
页码:80 / 82
页数:3
相关论文
共 30 条
  • [21] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [22] An Event-Based Unified System Model to Characterize and Evaluate Timing Covert Channels
    Shrestha, Pradhumna L.
    Hempel, Michael
    Sharif, Hamid
    Chen, Hsiao-Hwa
    IEEE SYSTEMS JOURNAL, 2016, 10 (01): : 271 - 280
  • [23] Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
    Gautam S.
    Pattani K.
    Zuhair M.
    Rashid M.
    Ahmad N.
    International Journal of Intelligent Networks, 2023, 4 : 337 - 348
  • [24] Design and implementation of multilevel security subsystem based on XACML and WEB services
    Jarmakiewicz, Jacek
    Podlasek, Tomasz
    2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2015,
  • [25] MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization
    Shen, Chaoqun
    Zhang, Jiliang
    Qu, Gang
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [26] Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
    Keller, Joerg
    Wendzel, Steffen
    APPLIED SCIENCES-BASEL, 2021, 11 (02): : 1 - 11
  • [27] Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels
    Schmidbauer, Tobias
    Wendzel, Steffen
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [28] A Case Study on the Detection of Hash Chain-based Covert Channels Using Heuristics and Machine Learning
    Schymiczek, Jeff
    Schmidbauer, Tobias
    Wendzel, Steffen
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [29] An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert Channels
    Saidi, Firas
    Trabelsi, Zouheir
    Ben Ghezela, Henda
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 177 - 192
  • [30] Another Step in the Ladder of DNS-Based Covert Channels: Hiding Ill-Disposed Information in DNSKEY RRs
    Anagnostopoulos, Marios
    Seem, John Andre
    INFORMATION, 2019, 10 (09)