A Calculus for Flow-Limited Authorization: Technical Report

نویسندگان

  • Owen Arden
  • Andrew C. Myers
چکیده

Real-world applications routinely make authorization decisions based on dynamic computation. Rea-soning about dynamically computed authority is challenging. Integrity of the system might be compro-mised if attackers can improperly influence the authorizing computation. Confidentiality can also becompromised by authorization, since authorization decisions are often based on sensitive data such asmembership lists and passwords. Previous formal models for authorization do not fully address the se-curity implications of permitting trust relationships to change, which limits their ability to reason aboutauthority that derives from dynamic computation. Our goal is a way to construct dynamic authorizationmechanisms that do not violate confidentiality or integrity.We introduce the Flow-Limited Authorization Calculus (FLAC), which is both a simple, expressivemodel for reasoning about dynamic authorization and also an information flow control language for se-curely implementing various authorization mechanisms. FLAC combines the insights of two previousmodels: it extends the Dependency Core Calculus with features made possible by the Flow-LimitedAuthorization Model. FLAC provides strong end-to-end information security guarantees even for pro-grams that incorporate and implement rich dynamic authorization mechanisms. These guarantees in-clude noninterference and robust declassification, which prevent attackers from influencing informationdisclosures in unauthorized ways. We prove these security properties formally for all FLAC programsand explore the expressiveness of FLAC with several examples.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flow-Limited Authorization: Technical Report

Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can be subverted by information flows that leak information or that influence how authority is delegated between principals. We argue that interactions between information flow and au...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Nonmalleable Information Flow: Technical Report

Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system. Unfortunately, it is too restrictive for real systems. Mechanisms for downgrading information are needed to capture real-world security requirements, but downgrading eliminates the strong compositiona...

متن کامل

The Effects of Different SDE Calculus on Dynamics of Nano-Aerosols Motion in Two Phase Flow Systems

Langevin equation for a nano-particle suspended in a laminar fluid flow was analytically studied. The Brownian motion generated from molecular bombardment was taken as a Wiener stochastic process and approximated by a Gaussian white noise. Euler-Maruyama method was used to solve the Langevin equation numerically. The accuracy of Brownian simulation was checked by performing a series of simulati...

متن کامل

A Design for a Security-Typed Language with Certificate-Based Declassification

This paper presents a calculus that supports information-flow security policies and certificate-based declassification. The decentralized label model and its downgrading mechanisms are concisely expressed in the polymorphic lambda calculus with subtyping (System F≾). We prove a conditioned version of the noninterference theorem such that authorization for declassification is justified by digita...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016