Process Algebra and Non-Interference
نویسندگان
چکیده
The information security community has long debated the exact definition of the term ‘security’. Even if we focus on the more specific notion of confidentiality the precise definition remains controversial. In their seminal paper [4], Goguen and Meseguer took an important step towards a formalisation of the notion of absence of information flow with the concept of non-interference. This too was found to have problems and limitations, particularly when applied to systems displaying non-determinism which led to a proliferation of refinements of this notion and there is still no consensus as to which of these is ‘correct’. We show that this central concept in information security is closely related to a central concept of computer science: that of the equivalence of systems. The notion of non-interference depends ultimately on our notion of process equivalence. However what constitutes the equivalence of two processes is itself a deep and controversial question in computer science with a number of distinct definitions proposed in the literature. We illustrate how several of the leading candidates for a definition of non-interference mirror notions of system equivalence. Casting these security concepts in a process algebraic framework clarifies the relationship between them and allows many results to be carried over regarding, for example, composition and the completeness of unwinding rules. We also outline some generalisations of a CSP formulation of non-interference to handle partial and conditional information flows.
منابع مشابه
Mathematical Models of Computer Security
In this chapter I present a process algebraic approach to the modelling of security properties and policies. I will concentrate on the concept of secrecy, also known as confidentiality, and in particular on the notion of non-interference. Non-interference seeks to characterise the absence of information flows through a system and, as such, is a fundamental concept in information security. A cen...
متن کاملThe survivability of survivability
A process algebraic formulation using a weakened form of non-interference in which acceptable performance in the face of certain envelopes of attack/failures can be defined is proposed in [7]. This is presented in the process algebra CSP. Given the unbounded, dynamic nature of many of the systems of interest it may be necessary to use a dynamic calculus such as the pi-calculus or ambient-calculus.
متن کاملCoPS - Checker of Persistent Security
CoPS is an automatic checker of multilevel system security properties. CoPS can be used to check three different bisimulation-based non-interference properties for systems expressed as terms of the Security Process Algebra (SPA) language. The considered properties are persistent, in the sense that they are preserved at each execution step. Moreover, they imply the Bisimulation-based Non Deducib...
متن کاملProcess Algebra and Information Flow
Controlling information flows through a system is the fundamental issue in information security. It turns out that making precise the notion of information flow, and in particular the absence of information flow, is a remarkably subtle question. Many formalizations have been proposed, many inspired by the seminal ideas of Goguen and Meseguer with their notion of non-interference. Even now the s...
متن کاملContext-Sensitive Equivalences for Non-interference Based Protocol Analysis
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra CryptoSPA. Our approach draws on new notions of behavioral equivalence, built on top of a context-sensitive labelled transition system, that allow us to characterize the behavior of a process in the presence of any at...
متن کاملUsing Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic protocols more resistant to denial of service by trading off the cost to defender against the cost to the attacker can be formalized. The first contribution of this paper is to introduce a new security property called impa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Computer Security
دوره 9 شماره
صفحات -
تاریخ انتشار 1999