scispace - formally typeset
Open AccessBook ChapterDOI

Access Control and Information Flow in Transactional Memory

Reads0
Chats0
TLDR
Transactional Memory Coherence and Consistency, an implementation due to Hammond et al, is shown to be secure with respect to intransitive information flow policies, and it is shown how to modify Scott's arbitration policies using the may-abort relation, yielding a class of secure implementations closely related to Scott's scheme.
Abstract
The paper considers the addition of access control to a number of transactional memory implementations, and studies its impact on the information flow security of such systems. Even after the imposition of access control, the Unbounded Transactional Memory due to Ananian et al, and most instances of a general scheme for transactional conflict detection and arbitration due to Scott, are shown to be insecure. This result applies even for a very simple policy prohibiting information flow from a high to a low security domain. The source of the insecurity is identified as the ability of agents to cause aborts of other agents' transactions. A generic implementation is defined, parameterized by a "may-abort" relation that defines which agents may cause aborts of other agents' transactions. This implementation is shown to be secure with respect to an intransitive information flow policy consistent with the access control table and "may-abort" relation. Using this result, Transactional Memory Coherence and Consistency, an implementation due to Hammond et al, is shown to be secure with respect to intransitive information flow policies. Moreover, it is shown how to modify Scott's arbitration policies using the may-abort relation, yielding a class of secure implementations closely related to Scott's scheme.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Transactional correctness for secure nested transactions

TL;DR: In this paper, the authors consider correctness in terms of transactional properties for secure nested transactions in a labeled transition system, the TauZero calculus, and validate the correctness of these transactions.
Book ChapterDOI

Security Correctness for Secure Nested Transactions

TL;DR: This article describes a noninterference result for secure nested transactions, based on observational equivalence, which allows the consideration of security properties such asNoninterference independently of transactional properties suchAs serializability.
Proceedings Article

Security Correctness for Secure Nested Transactions - Extended Abstract.

TL;DR: Secure nested transactions have been introduced as a synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security as mentioned in this paper, and the motivation is to consider information flow control for certain classes of concurrent applications.
Proceedings ArticleDOI

Security correctness for secure nested transactions: position paper

TL;DR: This article considers the synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security, an approach to supporting end-to-end security for a wide class of enterprise applications, those of concurrent transactional applications.
References
More filters
Book

Reasoning About Knowledge

TL;DR: Reasoning About Knowledge is the first book to provide a general discussion of approaches to reasoning about knowledge and its applications to distributed systems, artificial intelligence, and game theory.
Proceedings ArticleDOI

Security Policies and Security Models

TL;DR: The reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts.
Proceedings ArticleDOI

Software transactional memory for dynamic-sized data structures

TL;DR: A new form of software transactional memory designed to support dynamic-sized data structures, and a novel non-blocking implementation of this STM that uses modular contention managers to ensure progress in practice.
Journal ArticleDOI

Transactional Memory Coherence and Consistency

TL;DR: To explore the costs and benefits of TCC, the characteristics of an optimal transaction-based memory system are studied, and how different design parameters could affect the performance of real systems are examined.
Proceedings ArticleDOI

Multiple-banked register file architectures

TL;DR: This paper proposes a register file architecture composed of multiple banks, which provides low latency and simple bypass logic and shows that a two-level organization degrades IPC and increases performance by 87% and 92% when the register file access time is factored in.