{"title":"计算机安全的推理问题","authors":"T. Garvey","doi":"10.1109/CSFW.1992.236786","DOIUrl":null,"url":null,"abstract":"An inference problem in computer security occurs when an individual can infer classified information by viewing only information of strictly lower classification. This paper introduces questions for discussion for the computer security community. These questions are organized into the following areas: definition of the inference problem; requirements for a theory of the inference problem; mechanisms for controlling inference; and practical formulations of inference control. The author believes that investigation of these issues is required in order for progress to be made toward addressing the management of inference in computer security.<<ETX>>","PeriodicalId":350578,"journal":{"name":"[1992] Proceedings The Computer Security Foundations Workshop V","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"The inference problem for computer security\",\"authors\":\"T. Garvey\",\"doi\":\"10.1109/CSFW.1992.236786\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An inference problem in computer security occurs when an individual can infer classified information by viewing only information of strictly lower classification. This paper introduces questions for discussion for the computer security community. These questions are organized into the following areas: definition of the inference problem; requirements for a theory of the inference problem; mechanisms for controlling inference; and practical formulations of inference control. The author believes that investigation of these issues is required in order for progress to be made toward addressing the management of inference in computer security.<<ETX>>\",\"PeriodicalId\":350578,\"journal\":{\"name\":\"[1992] Proceedings The Computer Security Foundations Workshop V\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-06-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1992] Proceedings The Computer Security Foundations Workshop V\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSFW.1992.236786\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings The Computer Security Foundations Workshop V","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1992.236786","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An inference problem in computer security occurs when an individual can infer classified information by viewing only information of strictly lower classification. This paper introduces questions for discussion for the computer security community. These questions are organized into the following areas: definition of the inference problem; requirements for a theory of the inference problem; mechanisms for controlling inference; and practical formulations of inference control. The author believes that investigation of these issues is required in order for progress to be made toward addressing the management of inference in computer security.<>