Generic Model Interpretations: POSIX.1 and SQL - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Generic Model Interpretations: POSIX.1 and SQL

Description:

Generic Model Interpretations: POSIX.1 and SQL. Ku-Chuan Lim. 11/5/09. 2. Outline ... Generic Model Interpretations: POSIX.1 and SQL, Proceedings of the 1996 National ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 13
Provided by: kuchu
Category:

less

Transcript and Presenter's Notes

Title: Generic Model Interpretations: POSIX.1 and SQL


1
Generic Model Interpretations POSIX.1 and SQL
  • Ku-Chuan Lim

2
Outline
  • Reference Monitor Concept
  • Model Interpretation
  • Generic Model Interpretation
  • Producing a Generic Model Interpretation
  • Using a Generic Model Interpretation
  • Summary
  • Reference

3
Reference Monitor Concept AND72
Application Software
Operating System of Trusted Software
Operating System of Trusted Software
Reference Monitor
  • Tamperproof
  • Always invoked
  • Small enough

Operation System
4
Model Interpretation (MI)
Formal Security Policy (FSP)
Formal Security Policy Model (FSPM)
Descriptive Top-Level Specification (DTLS)
MI
B2 Checks (Trusted Computer System Evaluation
Criteria, TCSEC)
5
Generic Model Interpretation (GMI)
Formal Security Policy (FSP)
Formal Security Policy Model (FSPM)
Industry Standard
GMI
6
Producing a Generic Model Interpretation
Correspondences To Model Tables
DTLS
correspondences
Model (Rule)
TCB Interface Table
ALL Modules
Modules to Model Table
7
Producing a Generic Model Interpretation (cont.)
8
Producing a Generic Model Interpretation (cont.)
9
Producing a Generic Model Interpretation (cont.)
10
Using a Generic Model Interpretation
11
Summary
  • Benefits
  • Facilitate system and product evaluation
  • Facilitate model interpretation preparation and
    review

12
Reference
  • BELL96 Bell, D.Elliott. Generic Model
    Interpretations POSIX.1 and SQL, Proceedings of
    the 1996 National Computer Security Conference,
    October 1996.
  • Chapter 3 Designing Trusted Operating Systems
    of Security in Computing.
Write a Comment
User Comments (0)
About PowerShow.com