Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/882493.884385guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Providing flexibility in information flow control for object oriented systems

Published: 04 May 1997 Publication History
  • Get Citation Alerts
  • Abstract

    Abstract: This paper presents an approach to control information flow in object-oriented systems that takes into account, besides authorizations on objects, also how the information has been obtained and/or transmitted. These aspects are considered by allowing exceptions to the restrictions stated by the authorizations. Exceptions are specified by means of waivers associated with methods. Two kinds of waivers are supported: invoke-waivers, specifying exceptions applicable during a method's execution, and reply-waivers, specifying exceptions applicable to the information returned by a method. Information flowing from one object into another object is subject to the different waivers of the methods enforcing the transmission. We formally characterize information transmission and flow in a transaction taking into consideration different interaction modes among objects. We then define security specifications, meaning authorizations and waivers, and characterize safe information flows. We formally define conditions whose satisfaction ensures absence of unsafe flows and present an algorithm enforcing these conditions.

    Cited By

    View all
    • (2016)A Policy Framework for Data Fusion and Derived Data ControlProceedings of the 2016 ACM International Workshop on Attribute Based Access Control10.1145/2875491.2875492(47-57)Online publication date: 11-Mar-2016
    • (2014)Collaborative Verification of Information Flow for a High-Assurance App StoreProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660343(1092-1104)Online publication date: 3-Nov-2014
    • (2013)A Type System for Robust DeclassificationElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/S1571-0661(03)50014-783(263-277)Online publication date: 1-Jan-2013
    • Show More Cited By

    Index Terms

    1. Providing flexibility in information flow control for object oriented systems
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy
      May 1997

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 04 May 1997

      Author Tags

      1. access control
      2. authorizations
      3. exception specification
      4. information flow control flexibility
      5. information transmission
      6. interaction modes
      7. invoke-waivers
      8. object oriented systems
      9. object-oriented programming
      10. reply-waivers
      11. safe information flows
      12. security specifications
      13. transaction
      14. waivers

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)A Policy Framework for Data Fusion and Derived Data ControlProceedings of the 2016 ACM International Workshop on Attribute Based Access Control10.1145/2875491.2875492(47-57)Online publication date: 11-Mar-2016
      • (2014)Collaborative Verification of Information Flow for a High-Assurance App StoreProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660343(1092-1104)Online publication date: 3-Nov-2014
      • (2013)A Type System for Robust DeclassificationElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/S1571-0661(03)50014-783(263-277)Online publication date: 1-Jan-2013
      • (2009)On declassification and the non-disclosure policyJournal of Computer Security10.5555/1662658.166266217:5(549-597)Online publication date: 1-Oct-2009
      • (2009)Declassification: Dimensions and principlesJournal of Computer Security10.5555/1662658.166265917:5(517-548)Online publication date: 1-Oct-2009
      • (2008)Static analysis for inference of explicit information flowProceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering10.1145/1512475.1512486(50-56)Online publication date: 9-Nov-2008
      • (2008)Quantitative information flow as network flow capacityACM SIGPLAN Notices10.1145/1379022.137560643:6(193-205)Online publication date: 7-Jun-2008
      • (2008)Quantitative information flow as network flow capacityProceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/1375581.1375606(193-205)Online publication date: 7-Jun-2008
      • (2007)Fine-grained sticky provenance architecture for office documentsProceedings of the Security 2nd international conference on Advances in information and computer security10.5555/1778902.1778932(336-351)Online publication date: 29-Oct-2007
      • (2006)Creating Objects in the Flexible Authorization Framework20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 412710.5555/3127142.3127143(1-14)Online publication date: 31-Jul-2006
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media