Generalized Policy-Based Noninterference for Efficient Confidentiality-Preservation
Abstract
References
Index Terms
- Generalized Policy-Based Noninterference for Efficient Confidentiality-Preservation
Recommendations
The specification and compilation of obligation policies for program monitoring
ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications SecurityAn extensible software system must protect its resources from being abused by untrusted software extensions. The access control policies of such systems are traditionally enforced by reference monitors. Recent study of access control policies advocates ...
Noninterference via symbolic execution
FMOODS'12/FORTE'12: Proceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed SystemsNoninterference is a high-level security property that guarantees the absence of illicit information flow at runtime. Noninterference can be enforced statically using information flow type systems; however, these are criticized for being overly ...
Extending the Noninterference Version of MLS for SAT
Special issue on computer security and privacyA noninterference formulation of MLS applicable to the Secure Ada® Target (SAT) Abstract Model is developed. An analogous formulation is developed to handle the SAT type enforcement policy. Unwinding theorems are presented for both MLS and Multidomain ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Cisco Research University Funding
- Hasler Foundation
- Meta Security Research
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 479Total Downloads
- Downloads (Last 12 months)301
- Downloads (Last 6 weeks)45
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in