信息网络安全 ›› 2016, Vol. 16 ›› Issue (10): 47-53.doi: 10.3969/j.issn.1671-1122.2016.10.008

• • 上一篇    下一篇

应用安全形式化描述研究

张明德1(), 毕马宁2, 王舜3, 张清国4   

  1. 1. 中国华腾工业有限公司,北京 100080
    2. 公安部第三研究所,上海 200031
    3. 中国人民公安大学,北京 102623
    4.国家标准化管理委员会,北京 100088
  • 收稿日期:2016-09-15 出版日期:2016-10-31 发布日期:2020-05-13
  • 作者简介:

    作者简介: 张明德(1972—),男,甘肃,博士,主要研究方向为企业信息化和信息安全;毕马宁(1960—),男,江苏,研究员,硕士,主要研究方向为信息安全;王舜(1996—),男,山东,本科,主要研究方向为网络安全;张清国(1966—),男,山东,高级工程师,博士,主要研究方向为信息安全和数据挖掘。

Research on Formalized Description of Application Security

Mingde ZHANG1, Maning BI2, Shun WANG3, Qingguo ZHANG4   

  • Received:2016-09-15 Online:2016-10-31 Published:2020-05-13

摘要:

随着机构内部应用系统的逐渐增多,应用安全问题也愈发突出。鉴于应用系统及其安全的复杂性和多样性,如何合理表示应用安全成为难题,现有研究成果都仅面向应用安全的某一个侧面而缺乏针对性,还没有系统性的应用安全形式化描述模型。文章首先通过分析主客体访问机制,区分业务功能、安全功能和应用策略,对应用系统进行形式化描述。然后对两种最常用的安全功能(身份认证和权限控制)进行形式化定义。权限控制引入保密概念,分析了三种角色(岗位角色、业务角色和保密角色)和客体密级,并区分权限管理方、权限验证方和权限依赖方。在此基础上,通过引入用户身份信息、统一门户等概念,研究了四种统一管理策略和表示方法。

关键词: 应用安全, 身份认证, 权限控制, 统一管理

Abstract:

With the gradual increase of applications within organizations, the issues of application-security have become increasingly prominent. Due to the complexity and variety of applications and their security, how to reasonably express application-security becomes a difficult problem. Existing researches on application-security focus only on some aspects or lack of pertinence, and there is still no systematically formalized model for application-security at present. This paper presents formalized description for applications through analyzing subject-object access mechanism and distinguishing business functions, security functions and application policies. Then formalized descriptions for two most common security functions (authentication and authorization) are given. In authorization, based on the concept of secrecy introduced, three kinds of roles (position role, business role and secrecy role) and object’s degrees of secrecy are analyzed, and authority manager, authority verifier and authority relying party are differentiated. Meanwhile, four unified-management policies and their formalized description are proposed through the introduction of users’ identity information and unified portal.

Key words: application security, authentication, authorization, unified management

中图分类号: