2011 IEEE Symposium on Security and Privacy 2011
DOI: 10.1109/sp.2011.30
|View full text |Cite
|
Sign up to set email alerts
|

The Complexity of Intransitive Noninterference

Abstract: Abstract-1 The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows. Checking (i) P-security (Goguen and Meseguer), (ii) IPsecurity (Haigh and Young), and (iii) TA-security (van der Meyden) are all in PTIME, while checking TO-security (van der Meyden) is undecidable. The most important ingredients in the proofs of the PTIME upper bounds are new characte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Since automatic analysis of information-flow security is still restricted by the size of state space ( [43], [44]), it is difficult to deal with operating system kernels so far. Automatic analysis techniques (e.g.…”
Section: Methods Overviewmentioning
confidence: 99%
“…Since automatic analysis of information-flow security is still restricted by the size of state space ( [43], [44]), it is difficult to deal with operating system kernels so far. Automatic analysis techniques (e.g.…”
Section: Methods Overviewmentioning
confidence: 99%
“…(See [34] for an example that demonstrates that, already for static policies, we do not obtain completeness if we require that the unwinding be defined over the states of the system M itself. A more complex type of unwinding on the system M itself is shown to be complete for TA-security of static policies in [12]. It would be interesting to develop a generalization of this to the dynamic case, but we leave this for future work.)…”
Section: Proof Technique For Ta -Securitymentioning
confidence: 99%
“…We focus in this paper on intransitive policies in the concurrent system in which the actions are disordered. The complexity of intransitive noninterference was well discussed in [24] and [25]. Now we will give a table to compare the definition of information flow security for transitive and intransitive policies.…”
Section: Related Workmentioning
confidence: 99%
“…Paper [10] shows how to automate the resulting timed noninterference check within the context of the recent extension of FDR [12] to analyze a discrete version of Timed CSP [13] and how an extended theory of digitization has the potential both to create more accurate specifications and to infer when processes are non-interfering in the more usual continuous-time semantics. A theory was developed for state-based noninterference in a setting where different security policies-we call them local policies-apply in different parts of a given system [25].…”
Section: Introductionmentioning
confidence: 99%