1976
DOI: 10.1145/360051.360056
|View full text |Cite
|
Sign up to set email alerts
|

A lattice model of secure information flow

Abstract: This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. The central component of the model is a lattice structure derived from the security classes and justified by the semantics of information flow. The lattice properties permit concise formulations of the security requirements of different existing systems and facili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
768
0
4

Year Published

1985
1985
2011
2011

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 1,452 publications
(773 citation statements)
references
References 11 publications
1
768
0
4
Order By: Relevance
“…For instance, dynamic taint analysis (DTA) is used by many projects [32,[51][52][53], and is a able to detect control hijacking and code-injection attacks, but incurs large slowdowns (e.g., frequently 20x or more). Due to their large overhead, dynamic solutions are mostly used for the analysis of attacks and malware [54], and in honeypots [55].…”
Section: Related Workmentioning
confidence: 99%
“…For instance, dynamic taint analysis (DTA) is used by many projects [32,[51][52][53], and is a able to detect control hijacking and code-injection attacks, but incurs large slowdowns (e.g., frequently 20x or more). Due to their large overhead, dynamic solutions are mostly used for the analysis of attacks and malware [54], and in honeypots [55].…”
Section: Related Workmentioning
confidence: 99%
“…Following Denning [9] we divide information flows into two classes: direct and indirect. Indirect flows are just the transitive flows (a flow from x to y followed by a flow from y to z implies a flow from x to z).…”
Section: Information Flowmentioning
confidence: 99%
“…Our authorization framework can also be employed for implementing lattice-based access control (LBAC) policies [24]. LBAC has specifically been used in military, but sometimes LBAC has also been implemented in large enterprises [25].…”
Section: Implementing Lattice-based Access Control Policiesmentioning
confidence: 99%