NAS - TR - 0042 - 2006 Understanding Equivalance in High - Level and Information Flow Policy

نویسنده

  • Patrick McDaniel
چکیده

Information flow policies (labels and lattices) are not stated in terms that administrators and developers articulate security goals (natural language). This raises an important question central to the proposed investigation, “how do you translate higher level policies into information flow implementation?” Our approach is to develop models and algorithms that enable this translation. Consider the following simple access control policy: Any principal of the group ifPlayers can read a sensitive account balance from a local file owned by them. We assert that principal Alice is authenticated by password and is a member of the group ifPlayers. One possible implementation of this policy using information flow would proceed using delegation; that is, ifPlayers delegates to Alice (and the other members) through the principal hierarchy. To enforce the access rights, the program implements an openLocalFile function whose input is labeled (can only be called with data of equal or higher sensitivity than) ifPlayers and returns a file object labeled with the calling principal. The high-level policy is implemented by the information flow enforcement. The principal hierarchy ensures the group rights are enforced; no one other than the group members can call the function that reads the local file because they cannot produce input data of the correct label. The returned balance object is labeled with the sensitivity of the calling principal. Jif guarantees that no principal other than the caller (and the principals it delegates to) can access the object, and thus nobody can else read it (even other members of the group). The compilation of the code is a formal witness to this isolation. Such information flow policy enforcement is not a panacea; it cannot combat poor operational practices, bad cryptography, or bad policy. However, as in this case, it can prove that the code written to implement that policy does implement that policy. What remains is discovering how to formalize and automate the mapping from high-level policies to low-level policy implementations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threshold Effects in Sticky Information Philips Curve: Evidence from Iran

During the last decade, several studies have argued that sticky information model proposed by Mankiw and Reis (2002), in which firms update their information occasionally rather than instantaneously, explains some stylized facts about the inflation dynamics. Sticky information pricing model successfully captures the sluggish movement of aggregate prices in response to monetary policy shocks. De...

متن کامل

How much may I eat? Calorie estimates based upon energy expenditure prediction equations.

How much may I eat? Most healthcare workers, when asked this question, have insufficient knowledge to educate their patients on a healthy energy intake level. In this review we examine the available methods for estimating adult energy requirements with a focus on the newly developed National Academy of Sciences/Institute of Medicine (NAS/IOM) doubly-labelled water total energy expenditure (TEE)...

متن کامل

A nested circulation model for the North Aegean Sea

A multi-nested approach has been employed for numerical simulations in the northern part of the Aegean Sea in the framework of the MFSTEP (Mediterranean Forecast System: Toward Environmental Predictions) project. The high resolution (∼1.6 km) hydrodynamic model of the North Aegean Sea (NAS) has been nested within a coarser model of the Eastern Mediterranean (resolution ∼3.6 km) which is also ne...

متن کامل

Estimating BIST Resources in High-level Synthesis

Estimation of resources at various stages of the high-level synthesis process is essential to guide high-level synthesis algorithms towards optimal solutions. Lower bound es timation bounds the design space and gives an indication of the quality of the design synthesized. Previous work in high-level synthesis focused on bounds on functional resources. In this paper, we present lower bounds on t...

متن کامل

Information and data flow analysis for forestry sector in Iran as a basic requirement for designing a forest information system (FIS)

ABSTRACT The aim of this study was to evaluate the status of information on forest and data transfer and to identify the gaps in information and data flow in forestry sector in Iran. The study evaluated the data and information flow in three levels (control offices level, provincial offices level and organizational offices level) using the document analysis and questioning (interviews and ques...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006