Mediating secure information flow policies
نویسنده
چکیده
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining different sensitivity levels over a common dataset and investigate its ramifications on information flow policies. Next, safe-flow policies are formulated in full generality using domain-theoretic tools, and systematically derived as closure operators from Scott continuous functions. Maximum safeflow policies correspond to the top element of the lattice of the derived closureoperator collection. We then introduce a categorical framework for information flow, in which amalgamation is used to formulate and characterize informationflow policy merging. Our methods for mediating information flow policies should be of practical interest for information sharing among multiple agencies. Our formulation of safeflow policies as closure operators from Scott continuous functions and its associated categorical formulation of safe-flow policy merging provide a sound and general theoretical foundation for the first time for this topic, setting a stage for further development in this area.
منابع مشابه
On the Derivation of Lattice Structured Information Flow Policies
Recent studies in secure computer svstems have shown that lattice structured information flow policies have properties which lead to simple and efficient enforcement mechanisms. This paper outlines a method for transforming nonlattice structured policies into lattices while Dreserving the validity of all : flows.
متن کاملPattern Matching Information Flow using GADT
Integrating security policies into security assurance mechanisms to ensure end-to-end behavior is still a challenge. Information flow analysis and type checking are effective methods for the analysis and verification of secure communications and processing. Language-based information flow security models use programming-language for specifying and enforcing security policy. Dependently typed pr...
متن کاملSecure UML Information Flow using FlowUML
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against flow information extracted from UML sequence diagrams. FlowUML policies can be written at a coarse grain level of caller-callee relationships or at a finer level involving passed a...
متن کاملModeling Secure Information Flow with Boolean Functions
In this paper we describe two uses of Boolean functions in the context of secure information flow analysis. The first contribution concerns with modeling information flow with Boolean functions, which leads to an accurate information flow analysis that captures dependencies between possible flows. These dependencies are useful for debugging; refining the notion of secure information flow; and a...
متن کاملSecure Web Applications via Automatic Partitioning
Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually implemented as client-side code written in JavaScript. Moving code and data to the client can create security vulnerabilities, but currently there are no good methods for deciding when it is secure to do so. Swift automatically p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Comput.
دوره 205 شماره
صفحات -
تاریخ انتشار 2007