[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Controlled Declassification Based on Intransitive Noninterference

  • Conference paper
Programming Languages and Systems (APLAS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3302))

Included in the following conference series:

Abstract

Traditional noninterference cannot cope with common features of secure systems like channel control, information filtering, or explicit downgrading. Recent research has addressed the derivation and use of weaker security conditions that could support such features in a language-based setting. However, a fully satisfactory solution to the problem has yet to be found. A key problem is to permit exceptions to a given security policy without permitting too much. In this article, we propose an approach that draws its underlying ideas from intransitive noninterference, a concept usually used on a more abstract specification level. Our results include a new bisimulation-based security condition that controls tightly where downgrading can occur and a sound security type system for checking this condition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Agat, J.: Transforming out Timing Leaks. In: Proceedings of the ACM Symposium on Principles of Programming Languages, pp. 40–53 (2000)

    Google Scholar 

  2. Bell, D.E., LaPadula, L.: Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE (1976)

    Google Scholar 

  3. Backes, M., Pfitzmann, B.: Computational Probabilistic Non-interference. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 1–23. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Bossi, A., Piazza, C., Rossi, S.: Modelling Downgrading in Information Flow Security. In: Proc. of IEEE CSFW (to appear, 2004)

    Google Scholar 

  5. Clark, D., Hunt, S., Malacaria, P.: Quantitative Analysis of the Leakage of Confidential Data. In: Quantitative Aspects of Programming Languages—Selected papers from QAPL 2001. ENTCS, vol. 59 (2002)

    Google Scholar 

  6. Cohen, E.S.: Information Transmission in Sequential Programs. In: Foundations of Secure Computation, pp. 297–335. Academic Press, London (1978)

    Google Scholar 

  7. Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236–243 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  8. Di Pierro, A., Hankin, C., Wiklicky, H.: Approximate Non-Interference. In: Proceedings of IEEE CSFW, pp. 1–17 (2002)

    Google Scholar 

  9. Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  10. Laud, P.: Handling Encryption in an Analysis for Secure Information Flow. In: Degano, P. (ed.) ESOP 2003 and ETAPS 2003. LNCS, vol. 2618, pp. 159–173. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Lowe, G.: Quantifying Information Flow. In: Proceedings of IEEE CSFW, pp. 18–31 (2002)

    Google Scholar 

  12. Mantel, H.: Information Flow Control and Applications – Bridging a Gap. In: Oliveira, J.N., Zave, P. (eds.) FME 2001. LNCS, vol. 2021, pp. 153–172. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Mitchell, J., Ramanathan, A., Scedrov, A., Teague, V.: A Probabilistic Polynomial-Time Calculus for Analysis of Cryptographic Protocols (Preliminary report). In: Proc. of the Conf. on the Math. Foundations of Programming Semantics 1976. ENTCS, vol. 45 (2001)

    Google Scholar 

  14. Myers, A.C., Sabelfeld, A., Zdancewic, S.: Enforcing Robust Declassification. In: Proc. of IEEE CSFW (to appear, 2004)

    Google Scholar 

  15. von Oheimb, D.: Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 225–243. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Pinsky, S.: Absorbing Covers and Intransitive Non-Interference. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 102–113 (1995)

    Google Scholar 

  17. Roscoe, A.W., Goldsmith, M.H.: What is Intransitive Noninterference? In: Proceedings of IEEE CSFW, pp. 228–238 (1999)

    Google Scholar 

  18. Rushby, J.M.: Noninterference, Transitivity, and Channel-Control Security Policies. Technical Report CSL-92-02, SRI International (1992)

    Google Scholar 

  19. Sabelfeld, A., Myers, A.C.: A Model for Delimited Information Release. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol. 3233, pp. 174–191. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications 21(1), 5–19 (2003)

    Article  Google Scholar 

  21. Sabelfeld, A., Sands, D.: Probabilistic Noninterference for Multi-threaded Programs. In: Proceedings of IEEE CSFW, pp. 200–214 (2000)

    Google Scholar 

  22. Sabelfeld, A., Sands, D.: A Per Model of Secure Information Flow in Sequential Programs. HOSC 14(1), 59–91 (2001)

    MATH  Google Scholar 

  23. Volpano, D., Smith, G.: Eliminating Covert Flows with Minimum Typings. In: Proceedings of IEEE CSFW, pp. 156–168 (1997)

    Google Scholar 

  24. Volpano, D.M., Smith, G.: Verifying Secrets and Relative Secrecy. In: Proceedings of POPL, pp. 268–276 (2000)

    Google Scholar 

  25. Zdancewic, S.: A Type System for Robust Declassification. In: Proc. of the Conf. on the Math. Foundations of Programming Semantics. ENTCS (2003)

    Google Scholar 

  26. Zdancewic, S., Myers, A.C.: Robust Declassification. In: Proceedings of IEEE CSFW, pp. 15–23 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mantel, H., Sands, D. (2004). Controlled Declassification Based on Intransitive Noninterference. In: Chin, WN. (eds) Programming Languages and Systems. APLAS 2004. Lecture Notes in Computer Science, vol 3302. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30477-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30477-7_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23724-2

  • Online ISBN: 978-3-540-30477-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics