scispace - formally typeset
Open Access

Classification of Security Properties (Part I: Information Flow)

Reads0
Chats0
TLDR
In this paper, many non-interference-like properties proposed for computer security are classified and compared in a unifying framework and the resulting taxonomy is evaluated through some case studies of access control in computer systems.
Abstract
In the recent years, many formalizations of security properties have been proposed, most of which are based on different underlying models and are consequently difficult to compare. A classification of security properties is thus of interest for understanding the relationships among different definitions and for evaluating the relative merits. In this paper, many non-interference-like properties proposed for computer security are classified and compared in a unifying framework. The resulting taxonomy is evaluated through some case studies of access control in computer systems. The approach has been mechanized, resulting in the tool CoSeC. Various extensions (e.g., the application to cryptographic protocol analysis) and open problems are discussed.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Temporal Logics for Hyperproperties

TL;DR: It is shown that the quantification over paths naturally subsumes other extensions of temporal Logic with operators for information flow and knowledge, and the model checking problem for temporal logic with path quantification is decidable.
Journal ArticleDOI

Supervisory Control for Opacity

TL;DR: An effective algorithm for computing the most permissive controller >CS is opaque w.r.t.
Posted Content

A Temporal Logic for Hyperproperties

TL;DR: In this article, an extension of temporal logic with explicit path variables is investigated, and it is shown that the quantification over paths naturally subsumes other extensions of temporal logics with operators for information flow and knowledge.
Posted Content

Anonymity and Information Hiding in Multiagent Systems

TL;DR: This work gives several definitions of anonymity with respect to agents, actions, and observers in multiagent systems, and relates these definitions to other definitions of information hiding, such as secrecy.

Opacity Generalised to Transition Systems

TL;DR: In this article, the authors extend the notion of opacity to the model of labelled transition systems and generalise opacity in order to better represent concepts from the literature on information flow, such as anonymity and non-inference.
References
More filters
Book

Introduction to Automata Theory, Languages, and Computation

TL;DR: This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Journal ArticleDOI

Communicating sequential processes

TL;DR: It is suggested that input and output are basic primitives of programming and that parallel composition of communicating sequential processes is a fundamental program structuring method.
Book

Communication and Concurrency

TL;DR: This chapter discusses Bisimulation and Observation Equivalence as a Modelling Communication, a Programming Language, and its application to Equational laws.
Proceedings ArticleDOI

Security Policies and Security Models

TL;DR: The reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts.