Confidentiality Policies and Their Extraction from Programs

نویسندگان

  • Michael Carl Tschantz
  • Jeannette M. Wing
چکیده

We examine a well known confidentiality requirement called noninterference and argue that manysystems do not meet this requirement despite maintaining the privacy of its users. We discussa weaker requirement called incident-insensitive noninterference that captures why these systemsmaintain the privacy of its users while possibly not satisfying noninterference. We extend thisrequirement to depend on dynamic information in a novel way. Lastly, we present a methodbased on model checking to extract from program source code the dynamic incident-insensitivenoninterference policy that the given program obeys. This research was partially sponsored by the Army Research Office through grant number DAAD19-02-1-0389(“Perpetually Available and Secure Information Systems”) to Carnegie Mellon University’s CyLab and by a generousgift from the Hewlett-Packard Corporation. The views and conclusions contained in this document are those ofthe authors and should not be interpreted as representing the official policies, either expressed or implied, of anysponsoring institution, the U.S. government, or any other entity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مطالعه رابطه نگرش، ادراک و انگیزش کارکنان با موفقیت سیاست و برنامه‌های خصوصی‌سازی

In the late 1970s, Thatcher's government in UK launched and used the privatization of state-owned enterprises as an instrument to help modernize the unproductive UK economy. Then, growing by an economic tide in 1990s, it was known as a very important tool in the process of economic change of world's different countries from planned and governmental economy toward liberal and market economy. The...

متن کامل

Faceted execution of policy-agnostic programs Citation

It is important for applications to protect sensitive data. Even for simple confidentiality and integrity policies, it is often difficult for programmers to reason about how the policies should interact and how to enforce policies across the program. A promising approach is policy-agnostic programming, a model that allows the programmer to implement policies separately from core functionality. ...

متن کامل

From Interfering to Non-interfering Programs

This paper deals with the problem of protecting the confidentiality of data manipulated by sequential programs. We focus on policies guaranteeing confidentiality of information by controlling how information flows during program execution. There are two established means to enforce information flow policies: static analyses, that are performed at compile time and guarantee that all program exec...

متن کامل

Theory and Practice of Logic Programming

Trust management is an approach to access control in distributed systems where access decisions are based on policy statements issued by multiple principals and stored in a distributed manner. In trust management, the policy statements of a principal can refer to other principals’ statements; thus, the process of evaluating an access request (i.e., a goal) consists of finding a “chain” of polic...

متن کامل

ASHP statement on confidentiality of patient health care information.

The American Society of Health-System Pharmacists (ASHP) believes that all medical information is sensitive and should be given the utmost protection. ASHP supports the adoption into federal law of a minimum standard for protection of individually identifiable patient health information and believes that states should retain the ability to adopt standards that are more stringent than federal la...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007