Owned Policies for Information Security

  • Authors:
  • Hubie Chen;Stephen Chong

  • Affiliations:
  • Cornell University, Ithaca, NY;Cornell University, Ithaca, NY

  • Venue:
  • CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In many systems, items of information have ownersassociated with them. An owner of an item of informationmay want the systemto enforce a policy thatrestricts use of that information; we call such a policyan owned policy . Owned policies can be used in manycontexts, including information flow, access control,and software licensing. In this paper we introduce andstudy a general framework for owned policies.Relationships between security policies for a givensystem may be dependent on system aspects thatchange between or during system execution. As a result,there may be only partial knowledge of thestructure of security policies available when analyzinga system statically. We demonstrate that ourframework permits static reasoning about owned policiesunder partial knowledge, and we also exhibittractability results for the problem of inferring securitypolicies.