Characterizing Intransitive Non-Interference in Security Policies with Observability
نویسندگان
چکیده
This paper introduces a new algorithmic approach to the problem of checking the property of intransitive non-interference (INI) using discrete event systems (DES) tools and concepts. INI property is widely used in formal verification of security problems in computer systems and protocols. The approach consists of two phases: First a new property called iP observability (observability based on a purge function) is introduced to capture INI. We prove that a system satisfies INI if and only if it is iP -observable. Secondly, a relation between iP observability and P -observability (observability as used in DES) is established by transforming the automaton modeling a system/protocol into an automaton where P -observability (and hence iP -observability) can be determined. This allows us to check INI by checking P -observability, which can be done efficiently. Our approach can be used for all systems/protocols with three levels, which is sufficient for most non-interference problems for cryptographic protocols and systems. We also give examples to illustrate the applications our approach to cryptographic protocols and systems.
منابع مشابه
Opacity with Orwellian Observers and Intransitive Non-Interference
Opacity is a general behavioural security scheme flexible enough to account for several specific properties. Some secret set of behaviors of a system is opaque if a passive attacker can never tell whether the observed behavior is a secret one or not. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the se...
متن کاملNoninterference , Transitivity , and Channel - Control Security Policies 1
We consider noninterference formulations of security policies [7] in which the “interferes” relation is intransitive. Such policies provide a formal basis for several real security concerns, such as channel control [17, 18], and assured pipelines [4]. We show that the appropriate formulation of noninterference for the intransitive case is that developed by Haigh and Young for “multidomain secur...
متن کاملA comparison of semantic models for intransitive noninterference⋆
Noninterference is a notion of information flow security, originally defined for transitive information flow policies. A number of different definitions of noninterference have been proposed for intransitive policies. These definitions are stated with respect to several different semantic models, including state machines with observations on states, state machines with outputs associated to act...
متن کاملLocality-Based Security Policies
Information flow security provides a strong notion of endto-end security in computing systems. However sometimes the policies for information flow security are limited in their expressive power, hence complicating the matter of specifying policies even for simple systems. These limitations often become apparent in contexts where confidential information is released under specific conditions. We...
متن کاملInformation Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarifying the impact of transitive vs. intransitive policies on unwinding. Inspired partially by Mantel’s observations on unwinding for event systems, we remove the restriction on the unwinding relation to be an equivalence and obta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004