1980
DOI: 10.1145/357084.357088
|View full text |Cite
|
Sign up to set email alerts
|

An Axiomatic Approach to Information Flow in Programs

Abstract: A new approach to information flow in sequential and parallel programs is presented. Flow proof rules that capture the information flow semantics of a variety of statements are given and used to construct program flow proofs. The method is illustrated by examples. The applications of flow proofs to certifying information flow policies and to solving the confinement problem are considered. It is also shown that flow rules and correctness rules can be combined to form an even more powerful proof system.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
75
0

Year Published

1997
1997
2011
2011

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 129 publications
(76 citation statements)
references
References 11 publications
0
75
0
Order By: Relevance
“…There is evidence of both cases in the literature. For example, the instrumented semantics with flow sensitivity can be found in work by Andrews and Reitman [2], Mizuno and Oldehoeft [34], and Banâtre and Bryce [7]. All of these semantics are approximate: security constraints of executing one a of a conditional are computed based on both the branch that is taken and the branch that is not taken (cf.…”
Section: On Instrumented Security Semanticsmentioning
confidence: 99%
See 2 more Smart Citations
“…There is evidence of both cases in the literature. For example, the instrumented semantics with flow sensitivity can be found in work by Andrews and Reitman [2], Mizuno and Oldehoeft [34], and Banâtre and Bryce [7]. All of these semantics are approximate: security constraints of executing one a of a conditional are computed based on both the branch that is taken and the branch that is not taken (cf.…”
Section: On Instrumented Security Semanticsmentioning
confidence: 99%
“…Property 2 of not looking aside). For example, the intuitively secure program if h = h then l := 1 else l := 0 is considered to have flow from h to l, and is rejected by Andrews and Reitman's semantics [2] when h is high and l is low (similar examples can be constructed for the other work [34], [7] mentioned above).…”
Section: On Instrumented Security Semanticsmentioning
confidence: 99%
See 1 more Smart Citation
“…The account is not entirely satisfactory, since the details of the multi-level analysis are not made explicit, but the conclusion is that the dependency analysis subsumes multi-level security analysis. This is also implicit in Andrews and Reitman's information flow logic [AR80], whereby a logical flow deduction is made independently of a particular policy assigning security levels to variables. The principal typings result of [HS06] confirms that conclusion but also shows that (a) dependency analysis is itself a special case of flow-sensitive multi-level security analysis and (b) if multi-level security in a given lattice is the property of interest, dependency analysis doesn't provide any additional precision.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, we sketch some related efforts and some future research directions. 2 An Overview of the Type System…”
Section: Introductionmentioning
confidence: 99%