Handling declared information leakage: extended abstract

  • Authors:
  • R. Echahed;F. Prost

  • Affiliations:
  • Institut d'Informatique et de Mathématiques Appliquées de Grenoble, Grenoble, France;Institut d'Informatique et de Mathématiques Appliquées de Grenoble, Grenoble, France

  • Venue:
  • WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define formal tools in order to distinguish between authorized, or declared, information flows such as password testing (e.g., ATM, login processes, etc.) and non-authorized ones. We propose to define security policies as rewriting systems. Such policies define how the privacy levels of information evolve. A formal definition of secure processes with respect to a given security policy is given.