Characterizing Intransitive Non-Interference in Security Policies with Observability

نویسندگان

  • Nejib Ben Hadj-Alouane
  • Stéphane Lafrance
  • Feng Lin
  • John Mullins
  • Moez Yeddes
چکیده

This paper introduces a new algorithmic approach to the problem of checking the property of intransitive non-interference (INI) using discrete event systems (DES) tools and concepts. INI property is widely used in formal verification of security problems in computer systems and protocols. The approach consists of two phases: First a new property called iP observability (observability based on a purge function) is introduced to capture INI. We prove that a system satisfies INI if and only if it is iP -observable. Secondly, a relation between iP observability and P -observability (observability as used in DES) is established by transforming the automaton modeling a system/protocol into an automaton where P -observability (and hence iP -observability) can be determined. This allows us to check INI by checking P -observability, which can be done efficiently. Our approach can be used for all systems/protocols with three levels, which is sufficient for most non-interference problems for cryptographic protocols and systems. We also give examples to illustrate the applications our approach to cryptographic protocols and systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Opacity with Orwellian Observers and Intransitive Non-Interference

Opacity is a general behavioural security scheme flexible enough to account for several specific properties. Some secret set of behaviors of a system is opaque if a passive attacker can never tell whether the observed behavior is a secret one or not. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the se...

متن کامل

Noninterference , Transitivity , and Channel - Control Security Policies 1

We consider noninterference formulations of security policies [7] in which the “interferes” relation is intransitive. Such policies provide a formal basis for several real security concerns, such as channel control [17, 18], and assured pipelines [4]. We show that the appropriate formulation of noninterference for the intransitive case is that developed by Haigh and Young for “multidomain secur...

متن کامل

A comparison of semantic models for intransitive noninterference⋆

Noninterference is a notion of information flow security, originally defined for transitive information flow policies. A number of different definitions of noninterference have been proposed for intransitive policies. These definitions are stated with respect to several different semantic models, including state machines with observations on states, state machines with outputs associated to act...

متن کامل

Locality-Based Security Policies

Information flow security provides a strong notion of endto-end security in computing systems. However sometimes the policies for information flow security are limited in their expressive power, hence complicating the matter of specifying policies even for simple systems. These limitations often become apparent in contexts where confidential information is released under specific conditions. We...

متن کامل

Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage

We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarifying the impact of transitive vs. intransitive policies on unwinding. Inspired partially by Mantel’s observations on unwinding for event systems, we remove the restriction on the unwinding relation to be an equivalence and obta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004