Protecting privacy using the decentralized label model

被引:284
作者
Myers, AC
Liskov, B
机构
[1] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
[2] Cornell Univ, Dept Comp Sci, Ithaca, NY 14853 USA
关键词
security; languages; confidentiality; declassification; end-to-end; downgrading; information flow controls; integrity; lattice; policies; principals; roles; type checking;
D O I
10.1145/363516.363526
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Stronger protection is needed for the confidentiality and integrity of data, because programs containing untrusted code are the rule rather than the exception. Information flow control allows the enforcement of end-to-end security policies, but has been difficult to put into practice. This article describes the decentralized label model, a new label model for control of information flow in systems with mutual distrust and decentralized authority. The model improves on existing multilevel security models by allowing users to declassify information in a decentralized way, and by improving support for fine-grained data sharing. It supports static program analysis of information flow, so that programs can be certified to permit only acceptable information flows, while largely avoiding the overhead of run-time checking. The article introduces the language Jif, an extension to Java that provides static checking of information flow using the decentralized label model.
引用
收藏
页码:410 / 442
页数:33
相关论文
共 47 条
  • [1] ABADI M, 1997, P 3 INT C THEOR ASP
  • [2] Agat J., 2000, P 27 ACM S PRINC PRO
  • [3] Andrews G. R., 1980, ACM Transactions on Programming Languages and Systems, V2, P56, DOI 10.1145/357084.357088
  • [4] [Anonymous], 1998, P 25 ACM SIGPLAN SIG, DOI DOI 10.1145/268946.268976
  • [5] [Anonymous], 1998, POPL'98, Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, CA, USA, January 19-21, DOI [DOI 10.1145/268946.268975, 10.1145/268946.268975]
  • [6] [Anonymous], P ACM S PRINC PROGR, DOI [10.1145/292540.292555, DOI 10.1145/292540.292555]
  • [7] [Anonymous], P IEEE S SEC PRIV OA
  • [8] Bell D. E., 1976, ESDTR75306 MITRE
  • [9] Biba K.J., 1977, ESDTR76372
  • [10] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243