Downgrading policies and relaxed noninterference
Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Decentralized delimited release
APLAS'11 Proceedings of the 9th Asian conference on Programming Languages and Systems
Journal of Computer Security - CSF 2010
Hi-index | 0.00 |
In many systems, items of information have ownersassociated with them. An owner of an item of informationmay want the systemto enforce a policy thatrestricts use of that information; we call such a policyan owned policy . Owned policies can be used in manycontexts, including information flow, access control,and software licensing. In this paper we introduce andstudy a general framework for owned policies.Relationships between security policies for a givensystem may be dependent on system aspects thatchange between or during system execution. As a result,there may be only partial knowledge of thestructure of security policies available when analyzinga system statically. We demonstrate that ourframework permits static reasoning about owned policiesunder partial knowledge, and we also exhibittractability results for the problem of inferring securitypolicies.