A Rule-Set Approach to Formal Modeling of a Trusted Computer System
نویسنده
چکیده
This article describes a rule-set approach to formal modeling of a trusted computer system. A finite state machine models the access operations of the trusted system while a separate rule set expresses the system's trust policies. A powerful feature of this approach is its ability to fit several widely differing trust policies easily within the same model. The paper shows how this approach to modeling relates to general ideas of access control. Departing from the traditional abstractness of discussions of formal models, the paper also relates this approach to the implementation of real systems by connecting the rule set of the model to the system operations of a UNIX System V system. This gives high confidence that a real system could clearly derive from the elements of the formal model instead of additionally depending on numerous design and policy decisions not addressed in the model. Neither are the trust policies left largely to the imagination of the reader-the rule base has detailed specifications of the mandatory access control policy of UNIX System V/IVILS, a version of the Clark-Wilson integrity policy, and two supporting policies that implement roles. A fundamental point established by the work reported in this article is that formal modeling can be moved considerably closer to implementation of real systems, a fact that has great beneficial impact on the possibility of building high assurance trusted systems.
منابع مشابه
Improvement of Rule Generation Methods for Fuzzy Controller
This paper proposes fuzzy modeling using obtained data. Fuzzy system is known as knowledge-based or rule-bases system. The most important part of fuzzy system is rule-base. One of problems of generation of fuzzy rule with training data is inconsistence data. Existence of inconsistence and uncertain states in training data causes high error in modeling. Here, Probability fuzzy system presents to...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملDeveloping Reliable yet Flexible Software through If-Then Model Transformation Rules
Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...
متن کاملA Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness
Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a graphical formal modeling language to specify and model the system. However, modeling of large s...
متن کاملFuzzy Inference System Approach in Deterministic Seismic Hazard, Case Study: Qom Area, Iran
Seismic hazard assessment like many other issues in seismology is a complicated problem, which is due to a variety of parameters affecting the occurrence of an earthquake. Uncertainty, which is a result of vagueness and incompleteness of the data, should be considered in a rational way. Using fuzzy method makes it possible to allow for uncertainties to be considered. Fuzzy inference system,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computing Systems
دوره 7 شماره
صفحات -
تاریخ انتشار 1994