[1]肖军模.Petri网在保护系统安全性分析中的应用[J].东南大学学报(自然科学版),2003,33(6):694-698.[doi:10.3969/j.issn.1001-0505.2003.06.004]
 Xiao Junmo.Security problems of protection systems with the Petri net[J].Journal of Southeast University (Natural Science Edition),2003,33(6):694-698.[doi:10.3969/j.issn.1001-0505.2003.06.004]
点击复制

Petri网在保护系统安全性分析中的应用()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
33
期数:
2003年第6期
页码:
694-698
栏目:
计算机科学与工程
出版日期:
2003-11-20

文章信息/Info

Title:
Security problems of protection systems with the Petri net
作者:
肖军模
解放军理工大学通信工程学院,南京 210007
Author(s):
Xiao Junmo
Institute of Communication Engineering, PLA University of Science and Technology, Nanjing 210007,China
关键词:
获取-授予系统 权利转移 权利泄漏 TGS PTGS PTG-路径
Keywords:
Grant-Take system rights transfer rights leaking TGS PTGS PTG-path
分类号:
TP309
DOI:
10.3969/j.issn.1001-0505.2003.06.004
摘要:
介绍了用Petri网描述获取-授予系统的PTGS模型的方法,并利用PTGS模型探讨保护系统中访问权利泄漏或被窃取的问题.利用PTG-路径、“桥”、“岛屿”等概念形式地解决了该问题.虽然已经有人利用有向图的TGS模型解决过这一问题,但是利用Petri网技术研究该问题是一种新方法,而且更加直观.同时本文也对用Petri网模型研究信息安全问题做了有益探索.
Abstract:
A method describing Take-Grant system using the Petri net, which is called PTGS(Petri Taken-Grant System)model, is introduced, and applied to the problem of leaking access rights using PTGS. This problem is formally solved by using the concepts of PTG-path, “bridge” and “island”. Although this problem is solved by using a TGS based directed-arrow diagram, the research of this problem using a Petri net is new method and more direct. At the same time, a useful approach to the problems about information security using Petri net models is also presented.

参考文献/References:

[1] Bishop M,Snyder L.The transfer of information and authority in a protection system [A].In:Proc of the 7th ACM Symp on Oper Syst Princ [C].Pacific Grove,CA,1979.45-54.
[2] Harrison M A,Ruzzo W L,Ullman J D.Protection in operating system [J].Comm ACM,1976,2(8):461-471.
[3] 肖军模,刘军,周海钢.网络信息安全[M].北京:机械工业出版社,2003.57-62.
[4] 肖军模.网络信息安全与对抗[M].北京:解放军出版社,1999.106-111.
[5] 蒋继洪,黄月江.计算机系统、数据库系统和通信网络的安全与保密[M].成都:电子科技大学出版社,1995.189-194.
[6] Adam N R,Atluri V,Huank W K.Modeling and analysis of workflow using Petri nets [J]. Journal of Intelligent Information System,Special Issue on Workflow and Process Management,1998,10(2):131-158.
[7] Nyanchama M,Osborn S.The role graph model and conflicts of Interest [J].ACM Transactions on Information and System Security,1999,2(1):3-33.
[8] Bertino E,Ferrari E,Atluri V.The specification and enforcement of authorization constraints in workflow management systems[J].ACM Transactions on Information and System Security, 1999,2(1):65-104.

备注/Memo

备注/Memo:
基金项目: 国家自然科学基金重点资助项目(69931040).
作者简介: 肖军模(1947—), 男, 教授, 博士生导师, xiaojunmonanjing@msn.com.
更新日期/Last Update: 2003-11-20