Modelling declassification policies using abstract domain completeness

被引:7
|
作者
Mastroeni, Isabella [1 ]
Banerjee, Anindya [2 ]
机构
[1] Univ Verona, I-37100 Verona, Italy
[2] IMDEA Software Inst, Madrid, Spain
关键词
D O I
10.1017/S096012951100020X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper explores a three dimensional characterisation of a declassification-based non-interference policy and its consequences. Two of the dimensions consist of specifying: (a) the power of the attacker, that is, what public information a program has that an attacker can observe; and (b) what secret information a program has that needs to be protected. Both these dimensions are regulated by the third dimension: (c) the choice of program semantics, for example, trace semantics or denotational semantics, or any semantics in Cousot's semantics hierarchy. To check whether a program satisfies a non-interference policy, one can compute an abstract domain that over-approximates the information released by the policy and then check whether program execution can release more information than permitted by the policy. Counterexamples to a policy can be generated by using a variant of the Paige-Tarjan algorithm for partition refinement. Given the counterexamples, the policy can be refined so that the least amount of confidential information required for making the program secure is declassified.
引用
收藏
页码:1253 / 1299
页数:47
相关论文
共 50 条
  • [41] INVESTIGATING COMPLETENESS OF A SET OF SUBOPTIMAL CONTROL POLICIES
    STANOULOV, N
    BULLETIN DE L ACADEMIE POLONAISE DES SCIENCES-SERIE DES SCIENCES TECHNIQUES, 1972, 20 (02): : 155 - +
  • [42] Modelling access policies using roles in requirements engineering
    Crook, R
    Ince, D
    Nuseibeh, B
    INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (14) : 979 - 991
  • [43] Completeness and Consistency in Structural Domain Classifications
    Schaeffer, R. Dustin
    Kinch, Lisa N.
    Pei, Jimin
    Medvedev, Kirill E.
    Grishin, Nick, V
    ACS OMEGA, 2021, 6 (24): : 15698 - 15707
  • [44] Automatic analysis of DIFC systems using noninterference with declassification
    Li, Wenfa
    Yang, Zhi
    Liu, Jia
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (12): : 9385 - 9396
  • [45] A Compliance Mechanism for Planning in Privacy Domain Using Policies
    Taheri, Yousef
    Bourgne, Gauvain
    Ganascia, Jean-Gabriel
    NEW FRONTIERS IN ARTIFICIAL INTELLIGENCE, JSAI-ISAI 2021 WORKSHOPS, JURISIN 2021, LENLS18, SCIDOCA 2021, KANSEI-AI 2021, AND AI-BIZ 2021, 2023, 13856 : 77 - 92
  • [46] ON COMPLETENESS OF EXPONENTIAL SYSTEMS IN CONVEX DOMAIN
    Makhota, A. A.
    UFA MATHEMATICAL JOURNAL, 2018, 10 (01): : 76 - 79
  • [47] On completeness of a system of functions in an angular domain
    Dil'nyi V.M.
    Ukrainian Mathematical Journal, 2001, 53 (2) : 289 - 292
  • [48] Learning policies for abstract state spaces
    Timmer, S
    Riedmiller, M
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 3179 - 3184
  • [49] An abstract theorem on completeness of systems of root vectors of correct restrictions
    K. S. Tulenov
    L. K. Zhumanova
    Advances in Operator Theory, 2021, 6
  • [50] Automatic analysis of DIFC systems using noninterference with declassification
    Wenfa Li
    Zhi Yang
    Jia Liu
    Neural Computing and Applications, 2022, 34 : 9385 - 9396