Delimited Persistent Stochastic Non-Interference

被引:2
作者
Hillston, Jane [1 ]
Marin, Andrea [2 ]
Piazza, Carla [3 ]
Rossi, Sabina [2 ]
机构
[1] Univ Edinburgh, Edinburgh, Midlothian, Scotland
[2] Univ Ca Foscari Venezia, Venice, Italy
[3] Univ Udine, Udine, Italy
来源
PROCEEDINGS OF THE 12TH EAI INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION METHODOLOGIES AND TOOLS (VALUETOOLS 2019) | 2019年
关键词
Process Algebra; Markovian models; Non-Interference; INFORMATION-FLOW SECURITY;
D O I
10.1145/3306309.3306329
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Non-Interference is an information flow security property which aims to protect confidential data by ensuring the complete absence of any information flow from high level entities to low level ones. However, this requirement is too demanding when dealing with real applications: indeed, no real policy ever guarantees a total absence of information flow. In order to deal with real applications, it is often necessary to allow mechanisms for downgrading or declassifying information such as information filters and channel control. In this paper we generalize the notion of Persistent Stochastic Non-Interference (PSNI) in order to allow information to flow from a higher to a lower security level through a downgrader. We introduce the notion of Delimited Persistent Stochastic Non-Interference (D_PSNI) and provide two characterizations of it, one expressed in terms of bisimulation-like equivalence checks and another one formulated through unwinding conditions. Then we prove some compositionality properties. Finally, we present a decision algorithm and discuss its complexity.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 50 条
[21]   Are Indigenous conceptions of sovereignty as non-interference patriarchal? [J].
Kuokkanen, Rauna ;
Lightfoot, Sheryl ;
Starblanket, Gina ;
Wildcat, Matthew .
REVIEW OF INTERNATIONAL STUDIES, 2025, 51 (01) :1-21
[22]   Non-interference and local correctness in transactional memory [J].
Kuznetsov, Petr ;
Peri, Sathya .
THEORETICAL COMPUTER SCIENCE, 2017, 688 :103-116
[23]   Annotated Multisemantics To Prove Non-Interference Analyses [J].
Cabon, Gurvan ;
Schmitt, Alan .
PROCEEDINGS OF THE 2017 WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY (PLAS' 17), 2017, :49-62
[24]   Rule formats for compositional non-interference properties [J].
Tini, S .
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2004, 60-1 :353-400
[25]   Non-interference enforcement in bounded Petri nets [J].
Basile, Francesco ;
De Tommasi, Gianmaria ;
Sterle, Claudio .
2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, :4827-4832
[26]   Non-Interference Control Synthesis for Security Timed Automata [J].
Gardey, Guillaume ;
Mullins, John ;
Roux, Olivier H. .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 180 (01) :35-53
[27]   The Myth of Non-interference: Chinese Foreign Policy in Cambodia [J].
Po, Sovinda ;
Sims, Kearrin .
ASIAN STUDIES REVIEW, 2022, 46 (01) :36-54
[28]   Logic of multi-threaded programs for non-interference [J].
Li, Qin ;
Zeng, Qing-Kai ;
Yuan, Zhi-Xiang .
Ruan Jian Xue Bao/Journal of Software, 2014, 25 (06) :1143-1153
[29]   Proving Non-Interference on Reachability Properties: a Refinement Approach [J].
Frappier, Marc ;
Mammar, Amel .
2011 18TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2011), 2011, :25-32
[30]   On the impossibility of complete Non-Interference in Paretian social judgements [J].
Mariotti, Marco ;
Veneziani, Roberto .
JOURNAL OF ECONOMIC THEORY, 2013, 148 (04) :1689-1699