Locality-based security policies

  • Authors:
  • Terkel K. Tolstrup;Flemming Nielson;René Rydhof Hansen

  • Affiliations:
  • Informatics and Mathematical Modelling, Technical University of Denmark;Informatics and Mathematical Modelling, Technical University of Denmark;Department of Computer Science, University of Copenhagen

  • Venue:
  • FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

Information flow security provides a strong notion of end-to-end security in computing systems. However sometimes the policies for information flow security are limited in their expressive power, hence complicating the matter of specifying policies even for simple systems. These limitations often become apparent in contexts where confidential information is released under specific conditions. We present a novel policy language for expressing permissible information flow under expressive constraints on the execution traces for programs. Based on the policy language we propose a security condition shown to be a generalized intransitive non-interference condition. Furthermore a flow-logic based static analysis is presented and shown capable of guaranteeing the security of programs analysed.