{"title":"安全系统中的信息共享","authors":"J. W. Gray","doi":"10.1109/CSFW.1990.128193","DOIUrl":null,"url":null,"abstract":"The author attempts to establish a theoretical foundation for secure information sharing. He proposes a secure system structuring construct, called a secure object manager, as an example of a one-way information sharing mechanism. Secrecy, integrity, and availability requirements for the secure object manager are defined. A formal system model, including a careful treatment of communication via bounded buffers, is developed. Then he formally defines secrecy in terms of the model. This definition of secrecy precludes all covert channels, including storage, probabilistic, and timing channels. An implementation of the secure object manager that satisfies all the requirements considered is presented.<<ETX>>","PeriodicalId":185508,"journal":{"name":"[1990] Proceedings. The Computer Security Foundations Workshop III","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Information sharing in secure systems\",\"authors\":\"J. W. Gray\",\"doi\":\"10.1109/CSFW.1990.128193\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The author attempts to establish a theoretical foundation for secure information sharing. He proposes a secure system structuring construct, called a secure object manager, as an example of a one-way information sharing mechanism. Secrecy, integrity, and availability requirements for the secure object manager are defined. A formal system model, including a careful treatment of communication via bounded buffers, is developed. Then he formally defines secrecy in terms of the model. This definition of secrecy precludes all covert channels, including storage, probabilistic, and timing channels. An implementation of the secure object manager that satisfies all the requirements considered is presented.<<ETX>>\",\"PeriodicalId\":185508,\"journal\":{\"name\":\"[1990] Proceedings. The Computer Security Foundations Workshop III\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1990] Proceedings. The Computer Security Foundations Workshop III\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSFW.1990.128193\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1990] Proceedings. The Computer Security Foundations Workshop III","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1990.128193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The author attempts to establish a theoretical foundation for secure information sharing. He proposes a secure system structuring construct, called a secure object manager, as an example of a one-way information sharing mechanism. Secrecy, integrity, and availability requirements for the secure object manager are defined. A formal system model, including a careful treatment of communication via bounded buffers, is developed. Then he formally defines secrecy in terms of the model. This definition of secrecy precludes all covert channels, including storage, probabilistic, and timing channels. An implementation of the secure object manager that satisfies all the requirements considered is presented.<>