Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS

被引:0
|
作者
Bauereiss, Thomas [1 ]
Hutter, Dieter [1 ]
机构
[1] German Res Ctr Artificial Intelligence DFKI, Bremen, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Motivated by typical security requirements of workflow management systems, we consider the integrated verification of both safety properties (e.g. separation of duty) and information flow security predicates of the MAKS framework (e.g. modeling confidentiality requirements). Due to the refinement paradox, enforcement of safety properties might violate possibilistic information flow properties of a system. We present an approach where sufficient conditions for the compatibility of safety properties and information flow security are derived by performing an information flow analysis of a monitor enforcing the safety property and applying existing compositionality results for MAKS security predicates. These conditions then guarantee that the composition of a target system with the monitor satisfies both kinds of properties. We illustrate our approach by deriving sufficient conditions for the security-preserving enforcement of separation of duty and ordered message delivery in an asynchronous communication platform.
引用
收藏
页码:250 / 263
页数:14
相关论文
共 50 条
  • [1] Possibilistic information flow control in MAKS and action refinement
    Hutter, Dieter
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 268 - 281
  • [2] Unwinding possibilistic security properties
    Mantel, H
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 238 - 254
  • [3] Bisimulation and unwinding for verifying possibilistic security properties
    Bossi, A
    Focardi, R
    Piazza, C
    Rossi, S
    [J]. VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2003, 2575 : 223 - 237
  • [4] Comparing two information flow security properties
    Focardi, R
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 116 - 122
  • [6] The compositional security checker: A tool for the verification of information flow security properties
    Focardi, R
    Gorrieri, R
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (09) : 550 - 571
  • [7] STRUCTURE OF POSSIBILISTIC INFORMATION METRICS AND DISTANCES - PROPERTIES
    RAMER, A
    [J]. INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 1990, 17 (01) : 21 - 32
  • [8] Possibilistic Information Flow Control for Workflow Management Systems
    Bauereiss, Thomas
    Hutter, Dieter
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (148): : 47 - 62
  • [9] Possibilistic information flow control in the presence of encrypted communication
    Hutter, D
    Schairer, A
    [J]. COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 209 - 224
  • [10] Safety and security of information systems
    Shaw, R
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 190 - 199