Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems permitting information release is whether this release is safe: is it possible that the attacker compromises the information release mechanism and extracts more secret information than intended? While the security community has recognised the importance of the problem, the state-of-the-art in information release is, unfortunately, a number of approaches with somewhat unconnected semantic goals. We provide a road map of the main directions of current research, by classifying the basic goals according to what information is released, who releases information, where in the system information is released and when information can be released. With a general declassification framework as a longterm goal, we identify some prudent principles of declassification. These principles shed light on existing definitions and may also serve as useful "sanity checks" for emerging models.1 Note that in this article we will refer to both intentional, meaning deliberate, and intensional, meaning the opposite of extensional, when discussing declassification.A. Sabelfeld and D. Sands / Declassification: Dimensions and principles 519 clear distinctions, seeking to crystallise the security assurance provided by some known approaches.• Secondly, we identify some common semantic principles for declassification mechanisms:semantic consistency, which states that security definitions should be invariant under equivalence-preserving transformations; conservativity, which states that the definition of security should be a weakening of noninterference; monotonicity of release, which states that adding declassification annotations cannot make a secure program become insecure. Roughly speaking: the more you choose to declassify, the weaker the security guarantee; and non-occlusion, which states that the presence of declassifications cannot mask other covert information leaks.These principles help shed light on existing approaches and should also serve as useful "sanity checks" for emerging models.This article is a revised and extended version of a paper published in the IEEE Computer Security Foundations Workshop 2005 [71]. Compared to the earlier version, we overview some new work on declassification that has appeared under 2005 [32,34,35,37,43,50], consider "why" and "how" as other possible dimensions of declassification, sketch challenges for enforcing declassification policies along the dimensions, discuss dimensions of endorsement (the dual of declassification for integrity), and make other changes and improvements throughout.
Dimensions of declassificationThis section provides a classification of the basic declassification goals according to four axes: what information is released, who releases information, where in the system information is released and when information can be released.
WhatPartial, or selective, information flow policies [15,16,27,28,38,70] regulate what information may be released. Partial release g...