Open Access
Classification of Security Properties (Part I: Information Flow)
Riccardo Focardi,Roberto Gorrieri +1 more
- Vol. 2171, pp 331-396
Reads0
Chats0
TLDR
In this paper, many non-interference-like properties proposed for computer security are classified and compared in a unifying framework and the resulting taxonomy is evaluated through some case studies of access control in computer systems.Abstract:
In the recent years, many formalizations of security properties have been proposed, most of which are based on different underlying models and are consequently difficult to compare. A classification of security properties is thus of interest for understanding the relationships among different definitions and for evaluating the relative merits. In this paper, many non-interference-like properties proposed for computer security are classified and compared in a unifying framework. The resulting taxonomy is evaluated through some case studies of access control in computer systems. The approach has been mechanized, resulting in the tool CoSeC. Various extensions (e.g., the application to cryptographic protocol analysis) and open problems are discussed.read more
Citations
More filters
Book ChapterDOI
Temporal Logics for Hyperproperties
Michael R. Clarkson,Bernd Finkbeiner,Masoud Koleini,Kristopher K. Micinski,Markus N. Rabe,César Sánchez +5 more
TL;DR: It is shown that the quantification over paths naturally subsumes other extensions of temporal Logic with operators for information flow and knowledge, and the model checking problem for temporal logic with path quantification is decidable.
Journal ArticleDOI
Supervisory Control for Opacity
Posted Content
A Temporal Logic for Hyperproperties
TL;DR: In this article, an extension of temporal logic with explicit path variables is investigated, and it is shown that the quantification over paths naturally subsumes other extensions of temporal logics with operators for information flow and knowledge.
Posted Content
Anonymity and Information Hiding in Multiagent Systems
TL;DR: This work gives several definitions of anonymity with respect to agents, actions, and observers in multiagent systems, and relates these definitions to other definitions of information hiding, such as secrecy.
Opacity Generalised to Transition Systems
TL;DR: In this article, the authors extend the notion of opacity to the model of labelled transition systems and generalise opacity in order to better represent concepts from the literature on information flow, such as anonymity and non-inference.
References
More filters
Book
Introduction to Automata Theory, Languages, and Computation
TL;DR: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Journal ArticleDOI
Communicating sequential processes
TL;DR: It is suggested that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method.
Book
Communication and Concurrency
TL;DR: This chapter discusses Bisimulation and Observation Equivalence as a Modelling Communication, a Programming Language, and its application to Equational laws.
Proceedings ArticleDOI
Security Policies and Security Models
Joseph A. Goguen,José Meseguer +1 more
TL;DR: The reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts.