首页 > 最新文献

2011 IEEE 24th Computer Security Foundations Symposium最新文献

英文 中文
Integrated Specification and Verification of Security Protocols and Policies 安全协议和策略的综合规范和验证
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.9
Simone Frau, M. Dashti
We propose a language for formal specification of service-oriented architectures. The language supports the integrated specification of communication level events, policy level decisions, and the interaction between the two. We show that the reach ability problem is decidable for a fragment of service-oriented architectures. The decidable fragment is well suited for specifying, and reasoning about, security-sensitive architectures. In the decidable fragment, the attacker controls the communication media. The policies of services are centered around the trust application and trust delegation rules, and can also express RBAC systems with role hierarchy. The fragment is of immediate practical relevance: We report on the specification and verification of two security-sensitive architectures, stemming from the e-government and e-health domains.
我们为面向服务的体系结构的正式规范提出了一种语言。该语言支持通信级事件、策略级决策以及两者之间交互的集成规范。我们表明,对于面向服务的体系结构的片段,到达能力问题是可确定的。可决定的片段非常适合于指定和推理安全敏感的体系结构。在可判定分片中,攻击者控制通信媒体。服务的策略以信任应用和信任委托规则为中心,也可以表达具有角色层次结构的RBAC系统。该片段具有直接的实际意义:我们报告了源自电子政务和电子卫生领域的两个安全敏感架构的规范和验证。
{"title":"Integrated Specification and Verification of Security Protocols and Policies","authors":"Simone Frau, M. Dashti","doi":"10.1109/CSF.2011.9","DOIUrl":"https://doi.org/10.1109/CSF.2011.9","url":null,"abstract":"We propose a language for formal specification of service-oriented architectures. The language supports the integrated specification of communication level events, policy level decisions, and the interaction between the two. We show that the reach ability problem is decidable for a fragment of service-oriented architectures. The decidable fragment is well suited for specifying, and reasoning about, security-sensitive architectures. In the decidable fragment, the attacker controls the communication media. The policies of services are centered around the trust application and trust delegation rules, and can also express RBAC systems with role hierarchy. The fragment is of immediate practical relevance: We report on the specification and verification of two security-sensitive architectures, stemming from the e-government and e-health domains.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Complexity of Quantitative Information Flow Problems 定量信息流问题的复杂性
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.21
Pavol Cerný, K. Chatterjee, T. Henzinger
In this paper, we investigate the computational complexity of quantitative information flow (QIF) problems. Information-theoretic quantitative relaxations of noninterference (based on Shannon entropy)have been introduced to enable more fine-grained reasoning about programs in situations where limited information flow is acceptable. The QIF bounding problem asks whether the information flow in a given program is bounded by a constant $d$. Our first result is that the QIF bounding problem is PSPACE-complete. The QIF memoryless synthesis problem asks whether it is possible to resolve nondeterministic choices in a given partial program in such a way that in the resulting deterministic program, the quantitative information flow is bounded by a given constant $d$. Our second result is that the QIF memoryless synthesis problem is also EXPTIME-complete. The QIF memoryless synthesis problem generalizes to QIF general synthesis problem which does not impose the memoryless requirement (that is, by allowing the synthesized program to have more variables then the original partial program). Our third result is that the QIF general synthesis problem is EXPTIME-hard.
本文研究了定量信息流问题的计算复杂度。信息论的不干扰定量松弛(基于香农熵)已经被引入,以便在可以接受有限信息流的情况下对程序进行更细粒度的推理。QIF边界问题问的是给定程序中的信息流是否有一个常数d作为边界。我们的第一个结果是QIF边界问题是pspace完备的。QIF无记忆综合问题询问是否有可能在给定的部分程序中以这样的方式解决不确定性选择,即在结果确定性程序中,定量信息流由给定常数d限定。我们的第二个结果是QIF无内存合成问题也是exptime完备的。QIF无内存综合问题推广到不强加无内存要求的QIF一般综合问题(即,通过允许合成程序具有比原始部分程序更多的变量)。我们的第三个结果是QIF综合问题是EXPTIME-hard的。
{"title":"The Complexity of Quantitative Information Flow Problems","authors":"Pavol Cerný, K. Chatterjee, T. Henzinger","doi":"10.1109/CSF.2011.21","DOIUrl":"https://doi.org/10.1109/CSF.2011.21","url":null,"abstract":"In this paper, we investigate the computational complexity of quantitative information flow (QIF) problems. Information-theoretic quantitative relaxations of noninterference (based on Shannon entropy)have been introduced to enable more fine-grained reasoning about programs in situations where limited information flow is acceptable. The QIF bounding problem asks whether the information flow in a given program is bounded by a constant $d$. Our first result is that the QIF bounding problem is PSPACE-complete. The QIF memoryless synthesis problem asks whether it is possible to resolve nondeterministic choices in a given partial program in such a way that in the resulting deterministic program, the quantitative information flow is bounded by a given constant $d$. Our second result is that the QIF memoryless synthesis problem is also EXPTIME-complete. The QIF memoryless synthesis problem generalizes to QIF general synthesis problem which does not impose the memoryless requirement (that is, by allowing the synthesized program to have more variables then the original partial program). Our third result is that the QIF general synthesis problem is EXPTIME-hard.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Statistical Test for Information Leaks Using Continuous Mutual Information 基于连续互信息的信息泄漏统计检验
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.19
Tom Chothia, Apratim Guha
We present a statistical test for detecting information leaks in systems with continuous outputs. We use continuous mutual information to detect the information leakage from trial runs of a probabilistic system. It has been shown that there is no universal rate of convergence for sampled mutual information, however when the leakage is zero, and under some reasonable conditions, we establish a rate for the sampled estimate, and show that it can converge to zero very quickly. We use this result to develop a statistical test for information leakage, and we use our new test to analyse a number of possible fixes for a time-based information leak in e-passports. We compare our new test with existing statistical methods, and we find that our test outperforms these other tests in almost all cases, and in one case in particular, ours is the only statistical test that can detect an information leak.
我们提出了一个用于检测连续输出系统中信息泄漏的统计检验。我们使用连续互信息来检测概率系统试运行中的信息泄漏。研究表明,对于采样的互信息,不存在普遍的收敛速率,但当泄漏量为零时,在一定的条件下,我们建立了一个采样估计的收敛速率,并表明它可以很快收敛到零。我们使用这个结果来开发信息泄漏的统计测试,并使用我们的新测试来分析电子护照中基于时间的信息泄漏的一些可能修复方法。我们将我们的新测试与现有的统计方法进行比较,发现我们的测试在几乎所有情况下都优于其他测试,特别是在一种情况下,我们的测试是唯一可以检测到信息泄漏的统计测试。
{"title":"A Statistical Test for Information Leaks Using Continuous Mutual Information","authors":"Tom Chothia, Apratim Guha","doi":"10.1109/CSF.2011.19","DOIUrl":"https://doi.org/10.1109/CSF.2011.19","url":null,"abstract":"We present a statistical test for detecting information leaks in systems with continuous outputs. We use continuous mutual information to detect the information leakage from trial runs of a probabilistic system. It has been shown that there is no universal rate of convergence for sampled mutual information, however when the leakage is zero, and under some reasonable conditions, we establish a rate for the sampled estimate, and show that it can converge to zero very quickly. We use this result to develop a statistical test for information leakage, and we use our new test to analyse a number of possible fixes for a time-based information leak in e-passports. We compare our new test with existing statistical methods, and we find that our test outperforms these other tests in almost all cases, and in one case in particular, ours is the only statistical test that can detect an information leak.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115242460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection 最小化遗憾审计:隐私保护的学习理论基础
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.28
Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha
Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely affect patient care. Recognizing this need, we develop the first principled learning-theoretic foundation for audits. Our first contribution is a game-theoretic model that captures the interaction between the defender (e.g., hospital auditors) and the adversary (e.g., hospital employees). The model takes pragmatic considerations into account, in particular, the periodic nature of audits, a budget that constrains the number of actions that the defender can inspect, and a loss function that captures the economic impact of detected and missed violations on the organization. We assume that the adversary is worst-case as is standard in other areas of computer security. We also formulate a desirable property of the audit mechanism in this model based on the concept of regret in learning theory. Our second contribution is an efficient audit mechanism that provably minimizes regret for the defender. This mechanism learns from experience to guide the defender's auditing efforts. The regret bound is significantly better than prior results in the learning literature. The stronger bound is important from a practical standpoint because it implies that the recommendations from the mechanism will converge faster to the best fixed auditing strategy for the defender.
审计机制对于允许访问控制制度中的隐私保护至关重要,例如在拒绝合法访问请求可能对患者护理产生不利影响的医院中。认识到这一需求,我们为审计开发了第一个原则性的学习理论基础。我们的第一个贡献是一个博弈论模型,它捕捉了防御者(如医院审计员)和对手(如医院员工)之间的互动。该模型考虑了实际的考虑因素,特别是审计的周期性、限制防御者可以检查的操作数量的预算,以及捕获被检测到和未发现的违规对组织的经济影响的损失函数。我们假设对手是最坏的情况,这是计算机安全其他领域的标准。我们还基于学习理论中的后悔概念,提出了该模型中审计机制的理想属性。我们的第二个贡献是一个有效的审计机制,可以证明它可以最大限度地减少防御者的遗憾。该机制从经验中学习,以指导防御者的审计工作。遗憾界限显著优于先前学习文献的结果。从实践的角度来看,更强的界限很重要,因为它意味着来自机制的建议将更快地收敛到针对防御者的最佳固定审计策略。
{"title":"Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection","authors":"Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha","doi":"10.1109/CSF.2011.28","DOIUrl":"https://doi.org/10.1109/CSF.2011.28","url":null,"abstract":"Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely affect patient care. Recognizing this need, we develop the first principled learning-theoretic foundation for audits. Our first contribution is a game-theoretic model that captures the interaction between the defender (e.g., hospital auditors) and the adversary (e.g., hospital employees). The model takes pragmatic considerations into account, in particular, the periodic nature of audits, a budget that constrains the number of actions that the defender can inspect, and a loss function that captures the economic impact of detected and missed violations on the organization. We assume that the adversary is worst-case as is standard in other areas of computer security. We also formulate a desirable property of the audit mechanism in this model based on the concept of regret in learning theory. Our second contribution is an efficient audit mechanism that provably minimizes regret for the defender. This mechanism learns from experience to guide the defender's auditing efforts. The regret bound is significantly better than prior results in the learning literature. The stronger bound is important from a practical standpoint because it implies that the recommendations from the mechanism will converge faster to the best fixed auditing strategy for the defender.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"38 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115637057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Static Analysis for Efficient Hybrid Information-Flow Control 高效混合信息流控制的静态分析
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.17
Scott Moore, Stephen Chong
Hybrid information-flow monitors use a combination of static analysis and dynamic mechanisms to provide precise strong information security guarantees. However, unlike purely static mechanisms for information security, hybrid information-flow monitors incur run-time overhead. We show how static analyses can be used to make hybrid information-flow monitors more efficient, in two ways. First, a simple static analysis can determine when it is sound for a monitor to stop tracking the security level of certain variables. This potentially reduces run-time overhead of the monitor, particularly in applications where sensitive (i.e., confidential or untrusted) data is infrequently introduced to the system. Second, we derive sufficient conditions for soundly incorporating a wide range of memory abstractions into information-flow monitors. This allows the selection of a memory abstraction that gives an appropriate tradeoff between efficiency and precision. It also facilitates the development of innovative and sound memory abstractions that use run-time security information maintained by the monitor. We present and prove our results by extending the information-flow monitor of Russo and Sabelfeld (2010). These results bring us closer to efficient, sound, and precise enforcement of information security.
混合信息流监视器使用静态分析和动态机制的组合来提供精确的强大的信息安全保证。然而,与信息安全的纯静态机制不同,混合信息流监控器会产生运行时开销。我们将通过两种方式展示如何使用静态分析来提高混合信息流监视器的效率。首先,简单的静态分析可以确定监视器何时应该停止跟踪某些变量的安全级别。这可能会减少监视器的运行时开销,特别是在不经常向系统引入敏感(即机密或不可信)数据的应用程序中。其次,我们得出了将广泛的内存抽象整合到信息流监视器中的充分条件。这允许选择在效率和精度之间进行适当权衡的内存抽象。它还促进了使用监视器维护的运行时安全信息的创新和可靠的内存抽象的开发。我们通过扩展Russo和Sabelfeld(2010)的信息流监视器来展示并证明我们的结果。这些结果使我们更接近有效、健全和精确地执行信息安全。
{"title":"Static Analysis for Efficient Hybrid Information-Flow Control","authors":"Scott Moore, Stephen Chong","doi":"10.1109/CSF.2011.17","DOIUrl":"https://doi.org/10.1109/CSF.2011.17","url":null,"abstract":"Hybrid information-flow monitors use a combination of static analysis and dynamic mechanisms to provide precise strong information security guarantees. However, unlike purely static mechanisms for information security, hybrid information-flow monitors incur run-time overhead. We show how static analyses can be used to make hybrid information-flow monitors more efficient, in two ways. First, a simple static analysis can determine when it is sound for a monitor to stop tracking the security level of certain variables. This potentially reduces run-time overhead of the monitor, particularly in applications where sensitive (i.e., confidential or untrusted) data is infrequently introduced to the system. Second, we derive sufficient conditions for soundly incorporating a wide range of memory abstractions into information-flow monitors. This allows the selection of a memory abstraction that gives an appropriate tradeoff between efficiency and precision. It also facilitates the development of innovative and sound memory abstractions that use run-time security information maintained by the monitor. We present and prove our results by extending the information-flow monitor of Russo and Sabelfeld (2010). These results bring us closer to efficient, sound, and precise enforcement of information security.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127938117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Termination-Insensitive Computational Indistinguishability (and Applications to Computational Soundness) 终止不敏感的计算不可区分性(及其在计算可靠性中的应用)
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.24
Dominique Unruh
We defined a new notion of computational indistinguishability: termination-insensitive computational indistinguishability (tic-indistinguishability). Tic-indistinguishability models indistinguishability with respect to distinguishers that cannot distinguish between termination and non-termination. We sketch how the new notion allows to get computational soundness results of symbolic models for equivalence-based security properties(such as anonymity) for processes that contain loops, solving an open problem.
我们定义了一个新的计算不可分辨性概念:终端不敏感计算不可分辨性(tic- ininguishability)。对于无法区分终止和非终止的区分符,tic - ininguishability模型的不可区分性。我们概述了新概念如何允许为包含循环的进程获得基于等效的安全属性(例如匿名性)的符号模型的计算可靠性结果,从而解决了一个开放问题。
{"title":"Termination-Insensitive Computational Indistinguishability (and Applications to Computational Soundness)","authors":"Dominique Unruh","doi":"10.1109/CSF.2011.24","DOIUrl":"https://doi.org/10.1109/CSF.2011.24","url":null,"abstract":"We defined a new notion of computational indistinguishability: termination-insensitive computational indistinguishability (tic-indistinguishability). Tic-indistinguishability models indistinguishability with respect to distinguishers that cannot distinguish between termination and non-termination. We sketch how the new notion allows to get computational soundness results of symbolic models for equivalence-based security properties(such as anonymity) for processes that contain loops, solving an open problem.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124016889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Formal Analysis of Protocols Based on TPM State Registers 基于TPM状态寄存器的协议形式化分析
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.12
S. Delaune, S. Kremer, M. Ryan, G. Steel
We present a Horn-clause-based framework for analysing security protocols that use emph{platform configuration registers} (PCRs), which are registers for maintaining state inside the Trusted Platform Module (TPM). In our model, the PCR state space is unbounded, and our experience shows that a na"i ve analysis using ProVerif or SPASS does not terminate. To address this, we extract a set of instances of the Horn clauses of our model, for which ProVerif does terminate on our examples. We prove the soundness of this extraction process: no attacks are lost, that is, any query derivable in the more general set of clauses is also derivable from the extracted instances. The effectiveness of our framework is demonstrated in two case studies: a simplified version of Microsoft Bit locker, and a digital envelope protocol that allows a user to choose whether to perform a decryption, or to verifiably renounce the ability to perform the decryption.
我们提出了一个基于horn条款的框架,用于分析使用emph{平台配置寄存器}(pcr)的安全协议,这些寄存器用于维护可信平台模块(TPM)内的状态。在我们的模型中,PCR状态空间是无界的,我们的经验表明,使用ProVerif或SPASS进行na ' i ve分析不会终止。为了解决这个问题,我们提取了模型中Horn子句的一组实例,ProVerif会在我们的示例中终止这些实例。我们证明了这种提取过程的合理性:没有攻击损失,即在更一般的子句集中的任何查询可派生也可以从提取的实例中派生。我们的框架的有效性在两个案例研究中得到了证明:微软比特锁的简化版本,以及数字信封协议,该协议允许用户选择是否执行解密,或者可验证地放弃执行解密的能力。
{"title":"Formal Analysis of Protocols Based on TPM State Registers","authors":"S. Delaune, S. Kremer, M. Ryan, G. Steel","doi":"10.1109/CSF.2011.12","DOIUrl":"https://doi.org/10.1109/CSF.2011.12","url":null,"abstract":"We present a Horn-clause-based framework for analysing security protocols that use emph{platform configuration registers} (PCRs), which are registers for maintaining state inside the Trusted Platform Module (TPM). In our model, the PCR state space is unbounded, and our experience shows that a na\"i ve analysis using ProVerif or SPASS does not terminate. To address this, we extract a set of instances of the Horn clauses of our model, for which ProVerif does terminate on our examples. We prove the soundness of this extraction process: no attacks are lost, that is, any query derivable in the more general set of clauses is also derivable from the extracted instances. The effectiveness of our framework is demonstrated in two case studies: a simplified version of Microsoft Bit locker, and a digital envelope protocol that allows a user to choose whether to perform a decryption, or to verifiably renounce the ability to perform the decryption.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Assumptions and Guarantees for Compositional Noninterference 合成不干扰的假设与保证
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.22
H. Mantel, David Sands, Henning Sudbrock
The idea of building secure systems by plugging together "secure'' components is appealing, but this requires a definition of security which, in addition to taking care of top-level security goals, is strengthened appropriately in order to be compositional. This approach has been previously studied for information-flow security of shared-variable concurrent programs, but the price for compositionality is very high: a thread must be extremely pessimistic about what an environment might do with shared resources. This pessimism leads to many intuitively secure threads being labelled as insecure. Since in practice it is only meaningful to compose threads which follow an agreed protocol for data access, we take advantage of this to develop a more liberal compositional security condition. The idea is to give the security definition access to the intended pattern of data usage, as expressed by assumption-guarantee style conditions associated with each thread. We illustrate the improved precision by developing the first flow-sensitive security type system that provably enforces a noninterference-like property for concurrent programs.
通过将“安全”组件组合在一起来构建安全系统的想法很有吸引力,但这需要一个安全定义,除了考虑顶级安全目标外,还需要适当地加强安全定义以实现组合。以前已经研究过这种方法用于共享变量并发程序的信息流安全性,但是组合性的代价非常高:线程必须对环境可能对共享资源执行的操作极度悲观。这种悲观主义导致许多直观上安全的线程被标记为不安全的。由于在实践中,只有按照商定的数据访问协议组合线程才有意义,因此我们利用这一点来开发更自由的组合安全条件。其思想是让安全定义访问预期的数据使用模式,如与每个线程关联的假设保证样式条件所表示的那样。我们通过开发第一个流敏感安全类型系统来说明提高的精度,该系统可证明地为并发程序强制非干扰性质。
{"title":"Assumptions and Guarantees for Compositional Noninterference","authors":"H. Mantel, David Sands, Henning Sudbrock","doi":"10.1109/CSF.2011.22","DOIUrl":"https://doi.org/10.1109/CSF.2011.22","url":null,"abstract":"The idea of building secure systems by plugging together \"secure'' components is appealing, but this requires a definition of security which, in addition to taking care of top-level security goals, is strengthened appropriately in order to be compositional. This approach has been previously studied for information-flow security of shared-variable concurrent programs, but the price for compositionality is very high: a thread must be extremely pessimistic about what an environment might do with shared resources. This pessimism leads to many intuitively secure threads being labelled as insecure. Since in practice it is only meaningful to compose threads which follow an agreed protocol for data access, we take advantage of this to develop a more liberal compositional security condition. The idea is to give the security definition access to the intended pattern of data usage, as expressed by assumption-guarantee style conditions associated with each thread. We illustrate the improved precision by developing the first flow-sensitive security type system that provably enforces a noninterference-like property for concurrent programs.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128011214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
A Formal Framework for Provenance Security 来源安全的正式框架
Pub Date : 2011-06-27 DOI: 10.1109/CSF.2011.26
J. Cheney
Provenance, or information about the origin, derivation, or history of data, is becoming an important topic especially for shared scientific or public data on the Web. It clearly has implications on security (and vice versa) yet these implications are not well-understood. A great deal of work has focused on mechanisms for recording, managing or using some kind of provenance information, but relatively little progress has been made on foundational models that define provenance and relate it to security goals such as availability, confidentiality or privacy. We argue that such foundations are essential to making meaningful progress on these problems and should be developed. In this paper, we outline a formal model of provenance, propose formalizations of security properties for provenance such as disclosure and obfuscation, and explore their implications in domains based on automata, database queries and workflow provenance graphs.
出处,或关于数据的起源、派生或历史的信息,正在成为一个重要的主题,特别是对于在Web上共享的科学或公共数据。它显然对安全性有影响(反之亦然),但这些影响还没有得到很好的理解。大量的工作集中在记录、管理或使用某种来源信息的机制上,但在定义来源并将其与可用性、机密性或隐私性等安全目标联系起来的基础模型上,进展相对较少。我们认为,这些基础对于在这些问题上取得有意义的进展至关重要,应该加以发展。在本文中,我们概述了来源的形式化模型,提出了来源的安全属性(如披露和混淆)的形式化,并探讨了它们在基于自动机、数据库查询和工作流来源图的领域中的含义。
{"title":"A Formal Framework for Provenance Security","authors":"J. Cheney","doi":"10.1109/CSF.2011.26","DOIUrl":"https://doi.org/10.1109/CSF.2011.26","url":null,"abstract":"Provenance, or information about the origin, derivation, or history of data, is becoming an important topic especially for shared scientific or public data on the Web. It clearly has implications on security (and vice versa) yet these implications are not well-understood. A great deal of work has focused on mechanisms for recording, managing or using some kind of provenance information, but relatively little progress has been made on foundational models that define provenance and relate it to security goals such as availability, confidentiality or privacy. We argue that such foundations are essential to making meaningful progress on these problems and should be developed. In this paper, we outline a formal model of provenance, propose formalizations of security properties for provenance such as disclosure and obfuscation, and explore their implications in domains based on automata, database queries and workflow provenance graphs.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134491665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives 无障碍授权实施:使安全性与业务目标保持一致
Pub Date : 1900-01-01 DOI: 10.3233/JCS-140500
D. Basin, Samuel J. Burri, G. Karjoth
Access control is fundamental in protecting information systems but it also poses an obstacle to achieving business objectives. We analyze this tradeoff and its avoidance in the context of systems modeled as workflows restricted by authorization constraints including those specifying Separation of Duty (SoD) and Binding of Duty (BoD).To begin with, we present a novel approach to scoping authorization constraints within workflows with loops and conditional execution. Afterwards, we consider enforcement's effects on business objectives. We identify the notion of obstruction, which generalizes deadlock within a system where access control is enforced, and we formulate the existence of an obstruction-free enforcement mechanism as a decision problem. We present lower and upper bounds for the complexity of this problem and also give an approximation algorithm that performs well when authorizations are equally distributed among users.
访问控制是保护信息系统的基础,但它也对实现业务目标构成障碍。我们在受授权约束(包括指定职责分离(SoD)和职责绑定(BoD)的那些约束)限制的工作流建模的系统上下文中分析了这种权衡及其避免。首先,我们提出了一种在带有循环和条件执行的工作流中确定授权约束范围的新方法。然后,我们考虑强制执行对业务目标的影响。我们确定了阻塞的概念,它概括了执行访问控制的系统中的死锁,并且我们将无阻塞执行机制的存在表述为一个决策问题。我们给出了该问题复杂性的下界和上界,并给出了当授权在用户之间均匀分布时性能良好的近似算法。
{"title":"Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives","authors":"D. Basin, Samuel J. Burri, G. Karjoth","doi":"10.3233/JCS-140500","DOIUrl":"https://doi.org/10.3233/JCS-140500","url":null,"abstract":"Access control is fundamental in protecting information systems but it also poses an obstacle to achieving business objectives. We analyze this tradeoff and its avoidance in the context of systems modeled as workflows restricted by authorization constraints including those specifying Separation of Duty (SoD) and Binding of Duty (BoD).To begin with, we present a novel approach to scoping authorization constraints within workflows with loops and conditional execution. Afterwards, we consider enforcement's effects on business objectives. We identify the notion of obstruction, which generalizes deadlock within a system where access control is enforced, and we formulate the existence of an obstruction-free enforcement mechanism as a decision problem. We present lower and upper bounds for the complexity of this problem and also give an approximation algorithm that performs well when authorizations are equally distributed among users.","PeriodicalId":364995,"journal":{"name":"2011 IEEE 24th Computer Security Foundations Symposium","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
期刊
2011 IEEE 24th Computer Security Foundations Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1