Font Size: a A A

Several New Ideas On Information Security And Its Model And Evaluation

Posted on:2003-05-04Degree:DoctorType:Dissertation
Country:ChinaCandidate:S P LiFull Text:PDF
GTID:1118360092466704Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Nowadays with the developmeot of infOrmation technology, The informationsociety which is founded on the variety of networks environrnent, especia1ly theInternet has been constructed. Space is reduced. Time is shortened. The ways ofinteraction between people are changed and made convenient. The infOrmationsociety has been changing the notion of the people, changing and optimizing thefashion of living of human beings. It is not only a rich source of Anowledge andwisdom, but also a wide stage of the mental life of mankind. But tomorroWtomorrow could we wish extravagantly all of these.Quite fOrtUnate1y, since the very beginying of the dcvelopment of theinformation technOlogy, people haVe noticed the problem of information security.Through condrious stUdy and eXPloring, large ainountS of valuable approachesand experiences used to solve the problem of security of infOrmationinfrastructures have been accumulated. And eventually the concept and method of"information assurance (IA)" which has been ever developing and imProving isestablished. Information assurance has lowered the risk of security and increasesthe confidence for tomorrow's information societyThe pmpose of this paper is to stUdy the relevant problems pertain toinformation security Whick is closely related to information assurance. The firstchapter gives a retrospect of the brief history of the IA. The conc9PtS andaPproaches relating to information security among the course of development ofthe IA are introduced. For examPle, Reference Monitor (are), ReferenceValidation Mechanism (RVM), Trusted ComPuting Base (TCB), security model,TCSEC, CC, IATF FRITSA, etc. ChaPter 2 analyzes the time and space prOPerty' of infOrmation security. ln space, information security demonstrates the propertyof the information infrasmicture that layered in vertical, distributed in horizontaiand heterogeneous in strUctuTe and comPosition. In time, information security'demonstrate the property of the existence of information in differefit states andtime as well as the different life cycle stages of the information system.InfOrmation might in one of the different states of generation, storage, processing,transmitting and usage. The life cycle of information systems usually containsinitiation, consmiction, deployInent, evaluation, opefation and abandonmentstages. Steding off from the time-space property all aspects of infOrmationsecurity can be stUdied systematically. ChaPter 3 studies the most fundamentaltheoretical issues of information security i.e. the stUdy of information securitymodels. Based on the examination of the Bell and LaPudula (BLP) model, thelimitation of the model is indicated, and the model is expanded. A general theoremof systCm security has been put forward. In view of the highly distributed andopening characteristics of information systems in netWork times today, thischaPter emPloys a method of security domains separation to stUdy the security ofsystems of various kinds of degree of complexity The key for information systemsecurity is that the system security policies must be comPlete, correct andconsistent, and be enforced properly So the security policy is also discussed indetail in this chaPter, from policy correctness, fullness, consistency, granularity, topolicy variety. And an algorithm for checking the consistency of the policies isgiven. In order to fully understand the IA, chaPter 4 first gives a brief introductionof the "InfOrmation Assurance Technical Framework (IATF)", and then accordingto the speciaity of the development of China's information technology a "specialassurance" prob1em and technology that is often ignored by the normal "IA"technoiogy is brought forward. And based on the ways that a hostility functionmay acts, the methods used to detect (test) and prevent these functions are studied.The stUdy of the preventon measures for these kinds of hostility functions isexactly the task of the stu...
Keywords/Search Tags:information assurance, information security, information system security, security model, security policy, synthatic asscssmeat, information infrastructure, information system, hostility functions, fuzzy, security domain, consistency, evaluation
PDF Full Text Request
Related items