Disjunctive Policies for Database-Backed Programs

被引:0
作者
Ahmadian, Amir M. [1 ]
Soloviev, Matvey [1 ]
Balliu, Musard [1 ]
机构
[1] KTH Royal Inst Technol, Stockholm, Sweden
来源
2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024 | 2024年
基金
瑞典研究理事会;
关键词
INFORMATION-FLOW;
D O I
10.1109/CSF61375.2024.00017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When specifying security policies for databases, it is often natural to formulate disjunctive dependencies, where a piece of information may depend on at most one of two dependencies P-1 or P-2, but not both. A formal semantic model of such disjunctive dependencies, the Quantale of Information, was recently introduced by Hunt and Sands as a generalization of the Lattice of Information. In this paper, we seek to contribute to the understanding of disjunctive dependencies in database-backed programs and introduce a practical framework to statically enforce disjunctive security policies. To that end, we introduce the Determinacy Quantale, a new query-based structure which captures the ordering of disjunctive information in databases. This structure can be understood as a query-based counterpart to the Quantale of Information. Based on this structure, we design a sound enforcement mechanism to check disjunctive policies for database-backed programs. This mechanism is based on a type-based analysis for a simple imperative language with database queries, which is precise enough to accommodate a variety of row- and column-level database policies flexibly while keeping track of disjunctions due to control flow. We validate our mechanism by implementing it in a tool, DIVERT, and demonstrate its feasibility on a number of use cases.
引用
收藏
页码:388 / 402
页数:15
相关论文
共 34 条
[1]  
Abiteboul S., 1995, FDN DATABASES
[2]  
Ahmadian A. M., 2023, Divert
[3]  
Ahmadian AM, 2024, Arxiv, DOI arXiv:2312.10441
[4]  
Askarov A, 2008, LECT NOTES COMPUT SC, V5283, P333
[5]   JS']JSLINQ: Building Secure Applications across Tiers [J].
Balliu, Musard ;
Liebe, Benjamin ;
Schoepe, Daniel ;
Sabelfeld, Andrei .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :307-318
[6]  
Bender G, 2014, SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, P1411
[7]  
Bender GabrielM., 2013, SIGMOD, DOI [10.1145/2463676.2467798, DOI 10.1145/2463676.2467798]
[8]   Database security - Concepts, approaches, and challenges [J].
Bertino, E ;
Sandhu, R .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (01) :2-19
[9]  
Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295
[10]  
Chlipala A., 2010, S OPERATING SYSTEM D, P105