Process Algebra and Non-Interference

نویسندگان

  • Peter Y. A. Ryan
  • Steve A. Schneider
چکیده

The information security community has long debated the exact definition of the term ‘security’. Even if we focus on the more specific notion of confidentiality the precise definition remains controversial. In their seminal paper [4], Goguen and Meseguer took an important step towards a formalisation of the notion of absence of information flow with the concept of non-interference. This too was found to have problems and limitations, particularly when applied to systems displaying non-determinism which led to a proliferation of refinements of this notion and there is still no consensus as to which of these is ‘correct’. We show that this central concept in information security is closely related to a central concept of computer science: that of the equivalence of systems. The notion of non-interference depends ultimately on our notion of process equivalence. However what constitutes the equivalence of two processes is itself a deep and controversial question in computer science with a number of distinct definitions proposed in the literature. We illustrate how several of the leading candidates for a definition of non-interference mirror notions of system equivalence. Casting these security concepts in a process algebraic framework clarifies the relationship between them and allows many results to be carried over regarding, for example, composition and the completeness of unwinding rules. We also outline some generalisations of a CSP formulation of non-interference to handle partial and conditional information flows.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mathematical Models of Computer Security

In this chapter I present a process algebraic approach to the modelling of security properties and policies. I will concentrate on the concept of secrecy, also known as confidentiality, and in particular on the notion of non-interference. Non-interference seeks to characterise the absence of information flows through a system and, as such, is a fundamental concept in information security. A cen...

متن کامل

The survivability of survivability

A process algebraic formulation using a weakened form of non-interference in which acceptable performance in the face of certain envelopes of attack/failures can be defined is proposed in [7]. This is presented in the process algebra CSP. Given the unbounded, dynamic nature of many of the systems of interest it may be necessary to use a dynamic calculus such as the pi-calculus or ambient-calculus.

متن کامل

CoPS - Checker of Persistent Security

CoPS is an automatic checker of multilevel system security properties. CoPS can be used to check three different bisimulation-based non-interference properties for systems expressed as terms of the Security Process Algebra (SPA) language. The considered properties are persistent, in the sense that they are preserved at each execution step. Moreover, they imply the Bisimulation-based Non Deducib...

متن کامل

Process Algebra and Information Flow

Controlling information flows through a system is the fundamental issue in information security. It turns out that making precise the notion of information flow, and in particular the absence of information flow, is a remarkably subtle question. Many formalizations have been proposed, many inspired by the seminal ideas of Goguen and Meseguer with their notion of non-interference. Even now the s...

متن کامل

Context-Sensitive Equivalences for Non-interference Based Protocol Analysis

We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra CryptoSPA. Our approach draws on new notions of behavioral equivalence, built on top of a context-sensitive labelled transition system, that allow us to characterize the behavior of a process in the presence of any at...

متن کامل

Using Admissible Interference to Detect Denial of Service Vulnerabilities

Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic protocols more resistant to denial of service by trading off the cost to defender against the cost to the attacker can be formalized. The first contribution of this paper is to introduce a new security property called impa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Computer Security

دوره 9  شماره 

صفحات  -

تاریخ انتشار 1999