2011 IEEE 24th Computer Security Foundations Symposium 2011
DOI: 10.1109/csf.2011.15
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Enforcement of Knowledge-Based Security Policies

Abstract: Abstract-This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer a query over secret data based on an estimation of the querier's (possibly increased) knowledge given the result. Limiting knowledge is the goal of existing information release policies that employ mechanisms such as noising, anonymization, and redaction. Knowledge-based policies are more general: they increase flexibility by not fixing the means to restrict information flow. We enforce a know… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
48
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 37 publications
(48 citation statements)
references
References 24 publications
0
48
0
Order By: Relevance
“…Refinements of this idea appear in the work of Mardziel et al [17] and Bouissou et al [2]. Instead of the explicit representations of distributions found in these works, we characterize sets of distributions by means of bounds on moments of expressions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Refinements of this idea appear in the work of Mardziel et al [17] and Bouissou et al [2]. Instead of the explicit representations of distributions found in these works, we characterize sets of distributions by means of bounds on moments of expressions.…”
Section: Introductionmentioning
confidence: 99%
“…Proving expectation invariants often requires approximating the distribution of states after n steps of loop execution (see [2,20,22,9,17] for techniques that approximate distributions in a sound manner). However, even simple programs, such as the program shown in Figure 1, can exhibit complex distributions of reachable states after just a few steps of loop execution (see Figure 2).…”
Section: Introductionmentioning
confidence: 99%
“…Evaluation of information flow Mardziel et al [16,17] define the notion of knowledge threshold secure program. This is a generalisation of t-privacy allowing to attach different thresholds to different secrets.…”
Section: Related Workmentioning
confidence: 99%
“…Inspired by Clarkson et al's work on belief revision [6], Mardziel et al [16,17] propose a definition of knowledge threshold security stating that a program is secure if all the post-beliefs of all possible secrets are bounded by some threshold t. Espinoza and Smith [11] discuss this definition and name it worst-case posterior vulnerability underlining that it is very biased towards the worst output. In order to enforce knowledge threshold security, Mardziel et al [16,17] suggest to: i) run the program if the threshold holds for all the values of the secret input; ii) not run the program in case there is at least one value for which the guarantee does not hold.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation