信息安全研究 ›› 2017, Vol. 3 ›› Issue (7): 617-623.

• 赛博物理系统(CPS) 专题 • 上一篇    下一篇

基于 CC 的安全性规格形式化描述及验证方法

闫靖晨   

  1. 埼玉大学 信息与计算机科学系, 埼玉市 日本 338-8570
  • 收稿日期:2017-07-19 出版日期:2017-07-15 发布日期:2017-07-18
  • 通讯作者: 闫靖晨
  • 作者简介:闫靖晨 工学硕士

A Formal Specification and Verification Method for Security Specification Based on CC

  • Received:2017-07-19 Online:2017-07-15 Published:2017-07-18

摘要: 随着信息系统在社会生活中越来越重要,越来越必不可缺,人们对信息系统的安全性需求也不断地增加.不允许出现安全性漏洞的非常重要的信息系统,其安全性规格必须要使用形式化方法来描述且验证才是可靠的.介绍了在世界上首先提出的基于国际通用标准CC(ISO-NIEC15408)的安全性规格描述及验证方法.把国际通用标准CC中定义的功能元素作为信息安全性评价标准,用形式化规格描述语言Z和时序逻辑来进行形式化描述.另一方面,用UML把保护轮廓PP模式化,并在用Z形式化地描述了目标信息系统的安全性规格之后,采用定理证明方法和模型检测方法来对目标系统的安全性规格进行形式化验证.为了让只具备基础知识的验证者也能够轻松使用该方法,开发了其支援工具FORVEST.

关键词: 安全性规格, CC, Z, 时序逻辑, 形式化, 验证方法

Abstract: As information systems become more and more important and indispensable in social lives, the demands of people for the security of information systems are also increasing. For those important information systems that don't allow flaws, its security specification must be described and verified by formal methods. This paper introduces the security specification description and verification method we proposed first in the world based on the international commom standards CC (ISO-NIEC15408). Z notation and temporal logic are used to formalize the information security evaluation standard—the functional elements defined in the international standard CC. On the other hand, UML is used to model the protection profile formally, and after describing the security specification of the target information system by Z notation and temporal logic, theorem proving method and model checking method are used to verify the security specification of the target information system. In order to make the specification and verification easier for people that have poor professional knowledge, a support tool named FORVEST has been developed.

Key words: security specification, CC, Z notation, temporal logic, formalization, verification methods