Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy
DOI: 10.1109/risp.1994.296590
|View full text |Cite
|
Sign up to set email alerts
|

A general theory of composition for trace sets closed under selective interleaving functions

Abstract: This paper presents a general theory of system composition for possibilistic" security properties. We see that these properties fall outside of the AlpernSchneider safety liveness domain and hence, are not subject to the Abadi-Lamport Composition Principle. We then introduce a set of trace constructors called selective interleaving functions and show that possibilistic security properties are closure properties with respect to di erent classes of selective i n terleaving functions. This provides a uniform fram… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
227
1
1

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 228 publications
(231 citation statements)
references
References 15 publications
2
227
1
1
Order By: Relevance
“…It is known that noninterference is not a safety property [33], [47]. This, however, does not imply that a safe approximation of noninterference cannot be soundly enforced by a monitor (a trivially secure monitor might simply block all executions).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is known that noninterference is not a safety property [33], [47]. This, however, does not imply that a safe approximation of noninterference cannot be soundly enforced by a monitor (a trivially secure monitor might simply block all executions).…”
Section: Discussionmentioning
confidence: 99%
“…It is known that noninterference is not a safety property [33], [47]. Precise characterizations of what can be enforced by monitoring have been studied in the literature (e.g., [44], [22]), where noninterference is discussed as an example of a policy that cannot be enforced precisely by dynamic mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, the relation is not strong enough to preserve confidentiality properties in specifications, since it may introduce new conduits of information flow to low-level users [8,9]. This result can be established in our framework by appealing to the following lemma (from [7]).…”
Section: Confidentiality-preserving Refinementmentioning
confidence: 98%
“…Several semantic frameworks (including the MAKS) for expressing a range of confidentiality properties in a uniform manner have been proposed in the security literature [5,6,9,10,12,13,14]. The objective of these frameworks is to consolidate the existing definitions of noninterference-like properties in the literature, in order to evaluate and compare these properties systematically and to enable new confidentiality properties to be defined rigorously.…”
Section: Related Workmentioning
confidence: 99%
“…Separability is a security property introduced in [20] and has been defined as complete independence between high (confidential) and low level (public) sequences of actions. For this property to hold there should be no interaction between confidential and public sequences of actions (e.g., running these actions as two separate processes without any communication between them).…”
Section: Secure Service Composition Patternsmentioning
confidence: 99%