A Formal Model for MILS Integration
نویسنده
چکیده
The central artifact in a MILS system is its policy architecture. This identifies the logical components of the system and their channels for communications, and specifies which components are trusted. The components of the policy architecture are logically separate but may share physical resources under the control of trusted resource-sharing components, such as separation kernels or partitioning communications systems. Assurance for a MILS system involves four steps: • Assurance that individual trusted policy components enforce their local policies, • Assurance that the individual trusted policy components, in the context of the policy architecture, compose to enforce the overall system policy, • Assurance for individual resource-sharing components, • Assurance that the individual resource-sharing components compose to enforce the policy architecture. This report introduces a formal model for policy architectures and outlines formal approaches for accomplishing the four assurance tasks listed above. The policy architecture model imposes some modest constraints on the formal methods of assurance employed, but developers are otherwise free to employ whichever methods best suit the task concerned.
منابع مشابه
Separation and Integration in MILS (The MILS Constitution)
We describe the MILS approach to design, construction, integration, and evaluation of secure systems. The crucial feature of the MILS approach is that it separates the problems of enforcing security policy from those of securely sharing resources. MILS design proceeds in two steps: first, we develop a logical security policy architecture in which the system is deconstructed into interacting com...
متن کاملD31.1 Formal specification of a generic MILS seperation kernel
We introduce a theory of intransitive noninterference for separation kernels with control. We show that it can be instantiated for a simple API consisting of IPC and events.
متن کاملComposing Cross-Domain Solutions
High-assurance systems with multiple security levels use data filters to facilitate the safe flow of information from higher to lower classification levels. Since filters play a critical security role, they must be formally verified. However, a wide range of sanitization strategies has been developed to address the wide variety of data content and contexts that arise in practice. As the diversi...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملFormal Method in Service Composition in Heath Care Systems
One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verificati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008