Expressing Security Properties Using Selective Interleaving Functions
نویسندگان
چکیده
McLean’s notion of Selective Interleaving Functions (SIFs) is perhaps the bestknown attempt to construct a framework for expressing various security properties. We examine the expressive power of SIFs carefully. We show that SIFs cannot capture nondeducibility on strategies (NOS). We also prove that the set of security properties expressed with SIFs is not closed under conjunction, from which it follows that separability is strictly stronger than double generalized noninterference. However, we show that if we generalize the notion of SIF in a natural way, then NOS is expressible, and the set of security properties expressible by generalized SIFs is closed under conjunction.
منابع مشابه
A general theory of composition for trace sets closed under selective interleaving functions
This paper presents a general theory of system composition for \possibilistic" security properties. We see that these properties fall outside of the AlpernSchneider safety/liveness domain and hence, are not subject to the Abadi-Lamport Composition Principle. We then introduce a set of trace constructors called selective interleaving functions and show that possibilistic security properties are ...
متن کاملA General Theory of Security Properties
This paper presents a general theory of possibilistic security properties. We show that we can express a security property as a predicate that is true of every set containing all the traces with the same low level event sequence. Given this security predicate, we show how to construct a partial ordering of security properties. We also discuss information flow and present the weakest property su...
متن کاملMAYHAM - A New Hash Function
With the succumbing of various Hash functions to collision attacks, there have been serious research efforts to design new Hash functions which are robust against various contemporary attacks. MAYHAM is one such hash function that has been designed keeping in view the cryptographic properties needed yet resistant to all the publically known attacks. MAYHAM is designed as a simple and efficient ...
متن کاملKnowledge Based Approach for Mechanically Verifying Security Protocols
A new knowledge-based security protocol verification approach is proposed in this paper. A number of predicates, functions, assumptions and rules are used to infer the knowledge of participating principals. These items are implemented with Isabelle, which enables mechanical proving. This approach can prove protocols concerning interleaving protocol sessions and can prove the correctness of a me...
متن کاملDynamic Position Location and Tracking (D-PL&T) using Location based Hash Scheme for Malicious Detection under Doppler Spread Rayleigh Channel
A novel approach of the integrated security and dynamic Position Location and Tracking (PL&T) for malicious node maintaining two friendly nodes is proposed. Location based hash security scheme is deployed for detection of friendly and malicious nodes by encrypting hash functions using private location assets to increase the security level. In addition, PL&T is deployed forming the robust tracki...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/cs/0608022 شماره
صفحات -
تاریخ انتشار 2006