2017
DOI: 10.1007/s00165-017-0430-6
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic intransitive noninterference revisited

Abstract: The paper studies dynamic information flow security policies in an automaton-based model. Two semantic interpretations of such policies are developed, both of which generalize the notion of TA-security [van der Meyden ESORICS 2007] for static intransitive noninterference policies. One of the interpretations focuses on information flows permitted by policy edges, the other focuses on prohibitions implied by absence of policy edges. In general, the two interpretations differ, but necessary and sufficient condit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…The future work goal of this paper is to improve the method of formal proof based on the context of loop sentences and strive to accurately output the final context of loop sentences. Moreover, we also will learn Nickel [24] framework, a formulation of noninterference amenable to automated verification static noninterference, and we will design an automatic verification framework that formalizations and interface designs that are amenable to automated verification of dynamic noninterference [25] to verify security for ARINC653 core services.…”
Section: Discussionmentioning
confidence: 99%
“…The future work goal of this paper is to improve the method of formal proof based on the context of loop sentences and strive to accurately output the final context of loop sentences. Moreover, we also will learn Nickel [24] framework, a formulation of noninterference amenable to automated verification static noninterference, and we will design an automatic verification framework that formalizations and interface designs that are amenable to automated verification of dynamic noninterference [25] to verify security for ARINC653 core services.…”
Section: Discussionmentioning
confidence: 99%
“…Monotonicity with respect to restrictiveness. In [18] the notion of monotonicity with respect to restrictiveness is discussed, which holds for a given notion of security X if, for all systems M and policies → over the domain set of M, the following statement holds: if M is X-secure with respect to → then M is X-secure with respect to every policy → ′ with →⊆ → ′ . If a notion of security satisfies this property, we will say that it is monotonic.…”
Section: Policiesmentioning
confidence: 99%
“…More often than not, software systems are built as a collection of concurrently executing threads of execution that cooperate to process data. In doing so, these threads collectively implement security policies in which the sensitivity of the data being processed is often data-dependent [1]- [10], and the rules about to whom it can be disclosed and under what conditions can be non-trivial [11]- [16]. The presence of concurrency greatly complicates reasoning, since a thread that behaves securely when run in isolation can be woefully insecure in the presence of interference from others [10], [17]- [19] or due to scheduling [20], [21].…”
Section: Introductionmentioning
confidence: 99%