Abstract
In this paper, we describe the active network security model from access control and information flow model. We present an access control policy called family tree policy for active network. The family tree policy can correctly represent active network that cannot be correctly modeled by BLP and Chinese wall model. At the same time, we further research the information flow security properties of active network and present the novel methods to research the information flow based on inheriting classes. The properties of information flow are described by properties of the inheriting class inner flow and flow among the different inheriting classes. Research For the inheriting class flow, the classic information flow model can be used. For the flow among the inheriting classes, we present a novel method to research it based on the conception of timestamp and flow.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Tennenhouse, D., Wetherall, D.: Towards an Active Network Architecture. In: Multimedia Computing and Networking, San Jose, CA (1996)
Wetherall, D., John, V., et al.: ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. In: IEEE OPENARCH 1998, San Francisco, CA (April 1998)
http://www.choices.cs.uiuc.edu/Security/seraphim/May2000/SecurityArchitecture.pdf a6AN Security working group (May 2000)
Campbell, R.H., Liu, Z.: Dynamic interoperable security architecture for active network. In: IEEE OPENARCH 2000, Israel, March 2000, pp. 32–41 (2000)
Calvert, K.L.: Architectural framework for active networks, version 1.0 University of Kentucky (July 1999), http://www.ccgatech.edu/project/canes/papers/arch-1-0.ps.gz
Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report ESD-TR-278, vol. 1, The Mitre Corp., Bedford, MA (1973)
Bell, D.E.: Secure computer systems: A re.nement of the mathematical model.Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA (1973)
Brewer, D.F.C., Nash, M.J.: The Chinese wall security policy. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, pp. 215–228 (1989)
Goguen, A., Meseguer, J.: Security policies and security models. In: Proc. of the 1982 Symposium on Security and Privacy, pp. 11–20 (1982)
Focardi, R., Gorrieri, R.: A Classification of Security Properties. JCS 3(1), 5–33 (1995)
Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Trans. on Soft. Eng. 23(9), 550–571 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xia, Z., Jiang, Y., Zhong, Y., Zhang, S. (2004). A Novel Policy and Information Flow Security Model for Active Network. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-25952-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22125-8
Online ISBN: 978-3-540-25952-7
eBook Packages: Springer Book Archive