[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

A lattice model of secure information flow

Published: 01 May 1976 Publication History

Abstract

This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice structure derived from the security classes and justified by the semantics of information flow. The lattice properties permit concise formulations of the security requirements of different existing systems and facilitate the construction of mechanisms that enforce security. The model provides a unifying view of all systems that restrict information flow, enables a classification of them according to security objectives, and suggests some new approaches. It also leads to the construction of automatic program certification mechanisms for verifying the secure flow of information through a program.

References

[1]
Andrews, G.R. COPS-a protection mechanism for computer systems. Ph.D. Th., U. of Washington, July 1974.
[2]
Bell, D.E., and LaPadula, L.J. Secure computer systems: mathematical foundations and model. M74-244, The MITRE Corp., Bedford, Mass., May 1973.
[3]
Birkhoff, G. Lattice Theory. Amer. Math. Soc. Col. Pub., XXV, 3rd. ed., 1967.
[4]
Denning, D.E. Secure information flow in computer systems. Ph.D. Th., Purdue U., CSD TR 145, May 1975.
[5]
Denning, D.E., Denning, P.J., and Graham, G.S. Selectively confined subsystems. Proc. International Workshop on Protection in Operating Systems. IRIA, Aug. 1974, pp. 55-61.
[6]
Fenton, J.S. Information protection systems. Ph.D. Th., U. of Cambridge, 1973.
[7]
Fenton, J.S. Memoryless subsystems. Computer J. 17, 2 (May 1974), 143-147.
[8]
Fenton, J.S. An abstract computer model demonstrating directional information flow. U. of Cambridge, 1974.
[9]
Gaines, R.S. An operating system based on the concept of a supervisory computer. Comm. ACM 15, 3 (March 1972), 150-156.
[10]
Gat, I., and Saal, H.J. Memoryless execution: a programmer's viewpoint. IBM Tech. Rep. 025, IBM Israeli Scientific Center, March 1975.
[11]
Graham, G.S., and Denning, P.J. Protection-principles and practice. AFIPS Conf. Proc., Vol. 40, 1972 SJCC, AFIPS Press, Montvale, N.J., pp. 417-429.
[12]
Harrison, M.A., Ruzzo, W.L., and Ullman, J.D. On protection in operating systems. Proc. Fifth Symposium on Operating Systems Principles, The University of Texas at Austin, Nov. 1975, pp. 14-24.
[13]
Jones, A.K. Protection in programmed systems. Ph.D. Th., Carnegie-Mellon U., June 1973.
[14]
Jones, A.K., and Lipton, R.J. The enforcement of security policies for computation. Proc. Fifth Symposium on Operating Systems Principles, The University of Texas at Austin, Nov. 1975, pp. 197-206.
[15]
Lampson, B.W. Protection. Proc. Fifth Princeton Symposium on Information Sciences and Systems, Princeton U., March 1971, pp. 437-443.
[16]
Lampson, B.W. A note on the confinement problem. Comm. ACM 16, 10 (Oct. 1973), 613-615.
[17]
Minsky, M.L. Computation; Finite and Infinite Machines. Prentice-HaU, Engiewood Cliffs, N.J., 1967.
[18]
Organick, E.I. The MULTICS System: An Examination of its Structure, MIT Press, 1972.
[19]
Rotenberg, L.J. Making computers keep secrets. Ph.D. Th., MIT, MAC TR-115, Feb. 1974.
[20]
Schroeder, M.D., and Saltzer, J.H. A hardware architecture for implementing protection rings, Comm. ACM 15, 3 (March 1972), 157-170.
[21]
Stone, H.S. Discrete Mathematical Structures and their Applications. SRI, Chicago 1973.
[22]
Walter, K.G., et al. Modeling the security interface. Rep. No. 1158, Jennings Computing Center, Case Western Reserve U., Aug. 1974.
[23]
Weissman, C. Security controls in the ADEPT-50 time-sharing system. AFIPS Conf. Proc., Vol. 35, 1969 FJCC, AFIPS Press, Montvale, N.J., pp. 417-429.
[24]
Wulf, W., et al. HYDRA: The kernel of a multi-processor system. Comm. ACM 17, 6 (June 1974), 337-345.

Cited By

View all
  • (2024)Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN)Journal of Cybersecurity and Privacy10.3390/jcp40300234:3(468-493)Online publication date: 20-Jul-2024
  • (2024)Description of Paralocks language semantics in TLA+Programmirovanie10.31857/S0132347424010073(88-99)Online publication date: 15-Feb-2024
  • (2024)Bridge: A Leak-Free Hardware-Software Architecture for Parallel Embedded SystemsProceedings of the 2nd Workshop on Kernel Isolation, Safety and Verification10.1145/3698576.3698765(16-22)Online publication date: 4-Nov-2024
  • Show More Cited By
  1. A lattice model of secure information flow

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 19, Issue 5
    May 1976
    83 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/360051
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 May 1976
    Published in CACM Volume 19, Issue 5

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. information flow
    2. lattice
    3. program certification
    4. protection
    5. security
    6. security class

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)765
    • Downloads (Last 6 weeks)120
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN)Journal of Cybersecurity and Privacy10.3390/jcp40300234:3(468-493)Online publication date: 20-Jul-2024
    • (2024)Description of Paralocks language semantics in TLA+Programmirovanie10.31857/S0132347424010073(88-99)Online publication date: 15-Feb-2024
    • (2024)Bridge: A Leak-Free Hardware-Software Architecture for Parallel Embedded SystemsProceedings of the 2nd Workshop on Kernel Isolation, Safety and Verification10.1145/3698576.3698765(16-22)Online publication date: 4-Nov-2024
    • (2024)Compositional Security Analysis of Dynamic Component-based SystemsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695499(1232-1244)Online publication date: 27-Oct-2024
    • (2024)Specifying and Verifying Information Flow Control in SELinux ConfigurationsACM Transactions on Privacy and Security10.1145/369063627:4(1-35)Online publication date: 7-Oct-2024
    • (2024)ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control ModelACM Transactions on Privacy and Security10.1145/367114727:3(1-36)Online publication date: 17-Jun-2024
    • (2024)Quest Complete: The Holy Grail of Gradual SecurityProceedings of the ACM on Programming Languages10.1145/36564428:PLDI(1609-1632)Online publication date: 20-Jun-2024
    • (2024)Consistency Management for Security Annotations for Continuous VerificationProceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and Systems10.1145/3652620.3687821(1096-1105)Online publication date: 22-Sep-2024
    • (2024)Cocoon: Static Information Flow Control in RustProceedings of the ACM on Programming Languages10.1145/36498178:OOPSLA1(166-193)Online publication date: 29-Apr-2024
    • (2024)PanoptiChrome: A Modern In-browser Taint Analysis FrameworkProceedings of the ACM Web Conference 202410.1145/3589334.3645699(1914-1922)Online publication date: 13-May-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media