YIN Lihua, GUO Yunchuan, ZHANG Huibing, HUANG Wenting, FANG Binxing. Threat-Based Declassification and Endorsement for Mobile Computing[J]. Chinese Journal of Electronics, 2019, 28(5): 1041-1052. DOI: 10.1049/cje.2019.06.007
Citation: YIN Lihua, GUO Yunchuan, ZHANG Huibing, HUANG Wenting, FANG Binxing. Threat-Based Declassification and Endorsement for Mobile Computing[J]. Chinese Journal of Electronics, 2019, 28(5): 1041-1052. DOI: 10.1049/cje.2019.06.007

Threat-Based Declassification and Endorsement for Mobile Computing

  • Declassification and endorsement can efficiently improve the usability of mobile applications. However, both declassify and endorse operations in practice are often ad-hoc and nondeterministic, thus, being insecure. From a new perspective of threat assessments, we propose the Threat-based typed security p-calculus (πTBTS) to model declassification and endorsement in mobile computing. Intuitively, when relaxing confidentiality policies and/or integrity policies, we respectively assess threats brought by performing these two relaxes. If these threats are acceptable, the declassification and/or endorsement operations are permitted; Otherwise, they are denied. The proposed assessments have explicit security conditions, results and less open parameters, so our approach solves the problem of the ad-hoc and nondeterministic semantics and builds a bridge between threat assessments and declassification/endorsement.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return