Mediating secure information flow policies

نویسنده

  • Guo-Qiang Zhang
چکیده

In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining different sensitivity levels over a common dataset and investigate its ramifications on information flow policies. Next, safe-flow policies are formulated in full generality using domain-theoretic tools, and systematically derived as closure operators from Scott continuous functions. Maximum safeflow policies correspond to the top element of the lattice of the derived closureoperator collection. We then introduce a categorical framework for information flow, in which amalgamation is used to formulate and characterize informationflow policy merging. Our methods for mediating information flow policies should be of practical interest for information sharing among multiple agencies. Our formulation of safeflow policies as closure operators from Scott continuous functions and its associated categorical formulation of safe-flow policy merging provide a sound and general theoretical foundation for the first time for this topic, setting a stage for further development in this area.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Derivation of Lattice Structured Information Flow Policies

Recent studies in secure computer svstems have shown that lattice structured information flow policies have properties which lead to simple and efficient enforcement mechanisms. This paper outlines a method for transforming nonlattice structured policies into lattices while Dreserving the validity of all : flows.

متن کامل

Pattern Matching Information Flow using GADT

Integrating security policies into security assurance mechanisms to ensure end-to-end behavior is still a challenge. Information flow analysis and type checking are effective methods for the analysis and verification of secure communications and processing. Language-based information flow security models use programming-language for specifying and enforcing security policy. Dependently typed pr...

متن کامل

Secure UML Information Flow using FlowUML

FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against flow information extracted from UML sequence diagrams. FlowUML policies can be written at a coarse grain level of caller-callee relationships or at a finer level involving passed a...

متن کامل

Modeling Secure Information Flow with Boolean Functions

In this paper we describe two uses of Boolean functions in the context of secure information flow analysis. The first contribution concerns with modeling information flow with Boolean functions, which leads to an accurate information flow analysis that captures dependencies between possible flows. These dependencies are useful for debugging; refining the notion of secure information flow; and a...

متن کامل

Secure Web Applications via Automatic Partitioning

Swift is a new, principled approach to building web applications that are secure by construction. In modern web applications, some application functionality is usually implemented as client-side code written in JavaScript. Moving code and data to the client can create security vulnerabilities, but currently there are no good methods for deciding when it is secure to do so. Swift automatically p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Comput.

دوره 205  شماره 

صفحات  -

تاریخ انتشار 2007