Arrows for secure information flow

被引:28
|
作者
Li, Peng [1 ]
Zdancewic, Steve [1 ]
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
关键词
Information flow; Security; Haskell; Arrows; Type systems; Combinators;
D O I
10.1016/j.tcs.2010.01.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without modifying the base language. This design avoids the redundant work of producing new languages, lowers the threshold for adopting security-typed languages, and also provides great flexibility and modularity for using security-policy frameworks. The embedded security sublanguage is designed using a standard combinator interface called arrows. Computations constructed in the sublanguage have static and explicit control-flow components, making it possible to implement information-flow control using static-analysis techniques at run time, while providing strong security guarantees. This paper presents a formal proof that our embedded sublanguage provides noninterference, a concrete Haskell implementation and an example application demonstrating the proposed techniques.(1) (c) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1974 / 1994
页数:21
相关论文
共 50 条
  • [31] Verifying Secure Information Flow in Federated Clouds
    Zeng, Wen
    Koutny, Maciej
    Watson, Paul
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 78 - 85
  • [32] Information Flow Control for Secure Cloud Computing
    Bacon, Jean
    Eyers, David
    Pasquier, Thomas F. J. -M.
    Singh, Jatinder
    Papagiannis, Ioannis
    Pietzuch, Peter
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01): : 76 - 89
  • [33] Secure information flow by self-composition
    Barthe, Gilles
    D'Argenio, Pedro R.
    Rezk, Tamara
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2011, 21 (06) : 1207 - 1252
  • [34] Secure information flow with random assignment and encryption
    School of Computing and Information Sciences, Florida International University, Miami, FL 33199, United States
    Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (33-44):
  • [35] Stream Processing with Secure Information Flow Constraints
    Ray, Indrakshi
    Adaikkalavan, Raman
    Xie, Xing
    Gamble, Rose
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 311 - 329
  • [36] A uniform type structure for secure information flow
    Honda, Kohei
    Yoshida, Nobuko
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2007, 29 (06):
  • [37] Engineering Policies for Secure Interorganizational Information Flow
    Kunz, Steffen
    Fabian, Benjamin
    Marx, Daniel
    Mueller, Sebastian
    2011 15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOC 2011), 2011, : 438 - 447
  • [38] Secure Refactoring with Java']Java Information Flow
    Helke, Steffen
    Kammuller, Florian
    Probst, Christian W.
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 264 - 272
  • [39] Secure information flow via linear continuations
    Zdancewic, Steve
    Myers, Andrew C.
    Higher-Order and Symbolic Computation, 2002, 15 (2-3) : 209 - 234
  • [40] Semantics and program analysis of computationally secure information flow
    Laud, P
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 77 - 91