2012
DOI: 10.1007/978-3-642-29615-4_16
|View full text |Cite
|
Sign up to set email alerts
|

Disjunction Category Labels

Abstract: Abstract. We present disjunction category (DC) labels, a new label format for enforcing information flow in the presence of mutually distrusting parties. DC labels can be ordered to form a lattice, based on propositional logic implication and conjunctive normal form. We introduce and prove soundness of decentralized privileges that are used in declassifying data, in addition to providing a notion of privilege-hierarchy. Our model is simpler than previous decentralized information flow control (DIFC) systems an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
3
2

Relationship

5
4

Authors

Journals

citations
Cited by 37 publications
(41 citation statements)
references
References 26 publications
0
41
0
Order By: Relevance
“…Parts of the system, namely our labels and confinement mechanism, have been formalized in [30,[39][40][41]. We remark that different from other work, our language-level concurrent confinement system is sound even in the presence of termination and timing covert channels [41].…”
Section: Trust Assumptionsmentioning
confidence: 92%
See 1 more Smart Citation
“…Parts of the system, namely our labels and confinement mechanism, have been formalized in [30,[39][40][41]. We remark that different from other work, our language-level concurrent confinement system is sound even in the presence of termination and timing covert channels [41].…”
Section: Trust Assumptionsmentioning
confidence: 92%
“…The particular labels used by Hails are called DC labels. We described and formalized DC labels in a separate paper [39], so limit our discussion to a brief overview of their format and use in MAC. We refer readers to the full DC labels paper for more details.…”
Section: Labels and Confinementmentioning
confidence: 99%
“…In particular, the TIARA design [84] first proposed the idea of a zero-kernel operating system and sketched a concrete architecture, while the ARIES project proposed using a hardware rule cache to speed up information-flow tracking [16]. In TIARA and ARIES, tags had a fixed set of fields and were of limited length, whereas, in SAFE, tags are pointers to arbitrary data structures, allowing them to represent complex IFC labels encoding sophisticated security policies [62], for instance decentralized ones [69,85]. Moreover, unlike TIARA and ARIES, which made no formal soundness claims, SAFE proposes a set of IFC rules aimed at achieving noninterference; the proof we present in this paper, though for a simplified model, provides evidence that this goal is feasible.…”
Section: Related Workmentioning
confidence: 99%
“…There, the PUMP was used only to implement dynamic IFC; other special-purpose hardware mechanisms enforced properties such as memory safety [55] and compartmentalization [40]. Still, the PUMP design in the SAFE system was made quite flexible, since dynamic IFC is an active area of research, with various mechanisms [14], [18], [19], [48], [50], [78] and "label models" [61], [77] being proposed regularly, making baked-into-hardware solutions unattractive. A simple IFC micro-policy was studied formally for an idealized version of the SAFE processor [15].…”
Section: Related Workmentioning
confidence: 99%