Programming with explicit security policies

被引:0
作者
Myers, AC [1 ]
机构
[1] Cornell Univ, Ithaca, NY 14853 USA
来源
PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS | 2005年 / 3444卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. All three are problematic. There is no expressive, practical way to specify what systems must do and must not do. And if we had a specification, it would likely be infeasible to show that existing computing systems satisfy it. The alternative is to design it in from the beginning: accompany programs with explicit, machine-checked security policies, written by programmers as part of program development. Trustworthy systems must safeguard the end-to-end confidentiality, integrity, and availability of information they manipulate. We currently lack both sufficiently expressive specifications for these information security properties, and sufficiently accurate methods for checking them. Fortunately there has been progress on both fronts. First, information security policies can be made more expressive than simple noninterference or access control policies, by adding notions of ownership, declassification, robustness, and erasure. Second, program analysis and transformation can be used to provide strong, automated security assurance, yielding a kind of security by construction. This is an overview of programming with explicit information security policies with an outline of some future challenges.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 8 条
  • [1] [Anonymous], P ACM S PRINC PROGR, DOI [10.1145/292540.292555, DOI 10.1145/292540.292555]
  • [2] Chong S., 2004, P 11 ACM C COMP COMM
  • [3] Protecting privacy using the decentralized label model
    Myers, AC
    Liskov, B
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 410 - 442
  • [4] Myers Andrew C., 1999, P 26 ACM S PRINC PRO, P228, DOI 10.1145/292540.292561
  • [5] Language-based information-flow security
    Sabelfeld, A
    Myers, AC
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) : 5 - 19
  • [6] Volpano D., 1996, Journal of Computer Security, V4, P167
  • [7] Secure program partitioning
    Zdancewic, S
    Zheng, LT
    Nystrom, N
    Myers, AC
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (03): : 283 - 328
  • [8] ZHENG L, 2004, P 2 WORKSH FORM ASP