2009
DOI: 10.1007/978-3-642-01465-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Access Control and Information Flow in Transactional Memory

Abstract: Abstract. The paper considers the addition of access control to a number of transactional memory implementations, and studies its impact on the information flow security of such systems. Even after the imposition of access control, the Unbounded Transactional Memory due to Ananian et al, and most instances of a general scheme for transactional conflict detection and arbitration due to Scott, are shown to be insecure. This result applies even for a very simple policy prohibiting information flow from a high to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Birgisson and Erlingsson in [3] present the semantics and implementation for transactional memory introspection (TMI) that supports the enforcement of security policies in a reflective software transactional memory. Cohen, Meyden and Zuck [4] develop an access control model based on intransitive noninterference [10] to reason about allowable information flows due to access aborts in software transactional memory. These works essentially adapt the work of multilevel databases to software transactional memory.…”
Section: Related Workmentioning
confidence: 99%
“…Birgisson and Erlingsson in [3] present the semantics and implementation for transactional memory introspection (TMI) that supports the enforcement of security policies in a reflective software transactional memory. Cohen, Meyden and Zuck [4] develop an access control model based on intransitive noninterference [10] to reason about allowable information flows due to access aborts in software transactional memory. These works essentially adapt the work of multilevel databases to software transactional memory.…”
Section: Related Workmentioning
confidence: 99%