Access Control and Information Flow in Transactional Memory
نویسندگان
چکیده
The paper considers the addition of access control to a number of transactional memory implementations, and studies its impact on the information flow security of such systems. Even after the imposition of access control, the Unbounded Transactional Memory due to Ananian et al, and most instances of a general scheme for transactional conflict detection and arbitration due to Scott, are shown to be insecure. This result applies even for a very simple policy prohibiting information flow from a high to a low security domain. The source of the insecurity is identified as the ability of agents to cause aborts of other agents’ transactions. A generic implementation is defined, parameterized by a “may-abort” relation that defines which agents may cause aborts of other agents’ transactions. This implementation is shown to be secure with respect to an intransitive information flow policy consistent with the access control table and “may-abort” relation. Using this result, Transactional Memory Coherence and Consistency, an implementation due to Hammond et al, is shown to be secure with respect to intransitive information flow policies. Moreover, it is shown how to modify Scott’s arbitration policies using the may-abort relation, yielding a class of secure implementations closely related to Scott’s scheme.
منابع مشابه
Mechanisms for Unbounded, Conflict-Robust Hardware Transactional Memory
MECHANISMS FOR UNBOUNDED, CONFLICT-ROBUST HARDWARE TRANSACTIONAL MEMORY Colin Blundell Supervisor: Milo M. K. Martin Conventional lock implementations serialize access to critical sections guarded by the same lock, presenting programmers with a difficult tradeoff between granularity of synchronization and amount of parallelism realized. Recently, researchers have been investigating an emerging ...
متن کاملSupporting Transactional Memory in Distributed Systems based on the Data-Flow Model
A distributed TM model supports the TM API in a distributed system consisting of a network of nodes that communicate by message-passing links. Supporting TM in distributed systems is motivated by the difficulties of lockbased synchronization methods employed by existing distributed control-flow programming models such as RPCs. We consider Herlihy and Sun’s data-flow distributed TM model [3]. In...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملP7: The Roles of Long-Term Memory on the Organization of the Knowledge for Educators
Modern neuroscientific research help to solve the impotent challenge in curriculum design and teaching for enhancing students’ ability to organize information in a way that makes it efficient in response to an appropriate context such as problem solving and critical thinking via knowing about the mechanism of different type of memories especially long term memory. At first, we should to c...
متن کاملReducing the Integration Complexity of Software Transactional Memory with TBoost.STM
Transactional memory (TM) is a concurrency control paradigm that reduces the difficulty of writing parallel programs and supports the efficient execution of some concurrent workloads. While TM offers advantages over other abstractions, it can sometimes require complex hardware, programming language extensions, specific compiler support, or enforce impractical software design, making it unrealis...
متن کامل