Security Process Algebra-Based Information Flow Analysis and Verification of Security Model

王精明,虞慧群
DOI: https://doi.org/10.14135/j.cnki.1006-3080.2012.01.010
2012-01-01
Abstract:In characterizing security, the information flow security models capture more essence than the access control security models. Within the unified framework of security process algebra, this paper describes and formally defines six types of information flow security models and analyzes their relationship of logical implication based on trace semantics. Furthermore, both the verification algorithm and the verification tools are developed for the six information flow security models based on security process algebra. Finally, several examples are presented for their utilization.
What problem does this paper attempt to address?