Publication | Closed Access
End-to-End Availability Policies and Noninterference
41
Citations
33
References
2005
Year
Unknown Venue
EngineeringInformation SecurityVerificationAvailability PoliciesCommunicationSoftware AnalysisFormal VerificationHardware SecurityStatic CheckingFormal SpecificationAvailability IssueData PrivacyAvailability (System)Computer ScienceInformation ManagementType SystemEnd-to-end Availability PoliciesStatic Program AnalysisLanguage-based SecurityData SecuritySoftware SecurityProgram AnalysisFormal MethodsHigh AvailabilitySystem SoftwareType Annotations
This paper introduces the use of static information flow analysis for the specification and enforcement of end-to-end availability policies in programs. We generalize the decentralized label model, which is about confidentiality and integrity, to also include security policies for availability. These policies characterize acceptable risks by representing them as principals. We show that in this setting, a suitable extension of noninterference corresponds to a strong, end-to-end availability guarantee. This approach provides a natural way to specify availability policies and enables existing static dependency analysis techniques to be adapted for availability. The paper presents a simple language in which fine-grained information security policies can be specified as type annotations. These annotations can include requirements for all three major security properties: confidentiality, integrity, and availability. The type system for the language provably guarantees that any well-typed program has the desired noninterference properties, ensuring confidentiality, integrity, and availability.
| Year | Citations | |
|---|---|---|
1999 | 3.3K | |
1983 | 2.6K | |
2002 | 2.4K | |
1982 | 2.1K | |
2003 | 1.9K | |
1977 | 1.1K | |
1977 | 1K | |
1996 | 958 | |
1983 | 607 | |
1993 | 573 |
Page 1
Page 1