2015 IEEE 28th Computer Security Foundations Symposium 2015
DOI: 10.1109/csf.2015.42
|View full text |Cite
|
Sign up to set email alerts
|

Flow-Limited Authorization

Abstract: Enforcing the confidentiality and integrity of information is critical in distributed applications. Production systems typically use some form of authorization mechanism to protect information, but these mechanisms do not typically provide end-to-end information security guarantees. Information flow control mechanisms provide end-to-end security, but their guarantees break down when trust relationships may change dynamically, a common scenario in production environments. This dissertation presents flow-limited… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
77
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 31 publications
(77 citation statements)
references
References 64 publications
0
77
0
Order By: Relevance
“…Each example shows code that type-checks under existing informationflow type systems even though it contains insecure information flows, which we are able to characterize in a new way. These examples use the notation of the flow-limited authorization model (FLAM) [4], which offers an expressive way to state both information flow restrictions and authorization policies. However, the problems observed in these examples are not specific to FLAM; they arise in all previous information-flow models that support downgrading (e.g., [8,15,21,25,32,42,47]).…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Each example shows code that type-checks under existing informationflow type systems even though it contains insecure information flows, which we are able to characterize in a new way. These examples use the notation of the flow-limited authorization model (FLAM) [4], which offers an expressive way to state both information flow restrictions and authorization policies. However, the problems observed in these examples are not specific to FLAM; they arise in all previous information-flow models that support downgrading (e.g., [8,15,21,25,32,42,47]).…”
Section: Motivationmentioning
confidence: 99%
“…T now uses its authority to declassify both bids and send them to all parties. Since both bids have high integrity, this declassification is legal according to existing typing rules introduced to enforce (qualified) robust declassification [4,10,26].…”
mentioning
confidence: 99%
“…For this purpose, we use an authorization logic [2] based on the Flow-Limited Authorization Model (FLAM) [5]. We briefly describe our logic, highlighting where it differs from FLAM.…”
Section: Representing Authoritymentioning
confidence: 99%
“…Aura [20] and Fine [38] implement access control using proof-carrying authentication, where proofs of formulas in an authorization logic are used as capabilities [4]. Our access control logic is inspired by the Flow-Limited Authorization Model [5], which uses projections to describe attenuated authority without requiring additional constructs such as roles or groups.…”
Section: Inlined Reference Monitorsmentioning
confidence: 99%
See 1 more Smart Citation