国产bbaaaaa片,成年美女黄网站色视频免费,成年黄大片,а天堂中文最新一区二区三区,成人精品视频一区二区三区尤物

首頁> 外文學(xué)位 >Processing visual specifications of file system security.
【24h】

Processing visual specifications of file system security.

機譯:處理文件系統(tǒng)安全性的可視規(guī)范。

獲取原文
獲取原文并翻譯 | 示例

摘要

This dissertation pushes the boundary between textual and visual expression in a new way. We focus on the issue of writing specifications using a visual notation, and we describe two visual languages for this purpose. These languages provide users with the ability to formally specify security properties of a file system. Relative to previous text-based approaches to security specification, our use of a visual notation yields specifications that are more clear and concise. Moreover, since we formally define the semantics of our languages, every well-formed picture also has a precise meaning, and each can be processed by a computer. Our thesis is that visual languages can be practical and useful, even on a large scale, if they are targeted to sufficiently restricted domains of interest.; We focus on two different aspects of the security domain. First, we use the instance language to specify security configurations, that is, fixed access relationships between users and files on a file system. Since these specifications can be both read and written, they give users the ability to determine the access rights granted on their files and to modify those rights. Second, we use the constraint language to specify security policies, each of which determines a (possibly infinite) set of legal configurations. Systems administrators can use the constraint language to experiment with different policies. In fact, one important application of the constraint language is that it provides systems administrators with a vocabulary for specifying and automatically detecting potential security holes.; The semantics of both the instance language and the constraint language suggest natural computational problems, each of which raises interesting algorithmic questions. Central to our work is the design and implementation of efficient algorithms for processing pictures drawn in these languages. We describe a set of software tools we have developed, including a visual language compiler. In conjunction with the visual languages themselves, these tools give users an easy way to specify and process security configurations and policies.
機譯:本文以一種新的方式突破了文本表達與視覺表達之間的界限。我們專注于使用視覺符號編寫規(guī)范的問題,并為此目的描述了兩種視覺語言。這些語言使用戶能夠正式指定文件系統(tǒng)的安全性屬性。相對于以前的基于文本的安全性規(guī)范方法,我們對視覺符號的使用產(chǎn)生的規(guī)范更加清晰簡潔。此外,由于我們正式定義了語言的語義,因此每張格式正確的圖片也具有精確的含義,并且每張圖片都可以由計算機處理。我們的觀點是,如果視覺語言針對的是足夠受限制的興趣領(lǐng)域,那么即使是大規(guī)模的視覺語言也可能是實用且有用的。我們專注于安全域的兩個不同方面。首先,我們使用實例語言來指定安全性配置,即用戶和文件系統(tǒng)上文件之間的固定訪問關(guān)系。由于這些規(guī)范都可以讀取和寫入,因此它們使用戶能夠確定授予其文件的訪問權(quán)限并修改這些權(quán)限。其次,我們使用約束語言來指定安全策略,每個策略都確定(可能是無限的)一組合法配置。系統(tǒng)管理員可以使用約束語言來嘗試不同的策略。實際上,約束語言的一個重要應(yīng)用是它為系統(tǒng)管理員提供了用于指定和自動檢測潛在安全漏洞的詞匯。實例語言和約束語言的語義都暗示了自然的計算問題,每個問題都引發(fā)了有趣的算法問題。我們工作的核心是設(shè)計和實現(xiàn)用于處理以這些語言繪制的圖片的高效算法。我們描述了我們開發(fā)的一組軟件工具,包括視覺語言編譯器。這些工具與可視化語言本身結(jié)合在一起,為用戶提供了一種簡便的方法來指定和處理安全配置和策略。

著錄項

  • 作者

    Heydon, C. Allan.;

  • 作者單位

    Carnegie Mellon University.;

  • 授予單位 Carnegie Mellon University.;
  • 學(xué)科 Computer Science.
  • 學(xué)位 Ph.D.
  • 年度 1991
  • 頁碼 231 p.
  • 總頁數(shù) 231
  • 原文格式 PDF
  • 正文語種 eng
  • 中圖分類 自動化技術(shù)、計算機技術(shù);
  • 關(guān)鍵詞

相似文獻

  • 外文文獻
  • 中文文獻
  • 專利
獲取原文

客服郵箱:kefu@zhangqiaokeyan.com

京公網(wǎng)安備:11010802029741號 ICP備案號:京ICP備15016152號-6 六維聯(lián)合信息科技 (北京) 有限公司?版權(quán)所有
  • 客服微信

  • 服務(wù)號