2007
DOI: 10.1145/1323293.1294293
|View full text |Cite
|
Sign up to set email alerts
|

Information flow control for standard OS abstractions

Abstract: Decentralized Information Flow Control (DIFC) [24] is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity, DIFC allows trusted code to protect untrusted software from unexpected malicious inputs. In either case, only bugs in the trusted code, which tends … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
177
0
2

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 154 publications
(182 citation statements)
references
References 23 publications
0
177
0
2
Order By: Relevance
“…A foundation for distinguishing important exposure of information from acceptable use in aggregates is "differential privacy" [48]. c) Particular platforms: Adding tags to data items can track how information flows through a program, a database, a web application or an operating system [49], [50], [51], [52]. Tracking and visualising large volumes of provenance as information flows among cloud-hosted applications has been studied [53], [54], [55].…”
Section: The Challenge: Users Control Of Data Flowmentioning
confidence: 99%
“…A foundation for distinguishing important exposure of information from acceptable use in aggregates is "differential privacy" [48]. c) Particular platforms: Adding tags to data items can track how information flows through a program, a database, a web application or an operating system [49], [50], [51], [52]. Tracking and visualising large volumes of provenance as information flows among cloud-hosted applications has been studied [53], [54], [55].…”
Section: The Challenge: Users Control Of Data Flowmentioning
confidence: 99%
“…DIFC follows traditional IFC and add decentralized privilege. Some [6] are finegrained language-level DIFC systems while the others [7] are OS-level DIFC systems to protect the the system resources. To meet the security requirements of SaaS users, we choose to provide the controlling granularity of process.…”
Section: A Main Ideamentioning
confidence: 99%
“…Implementations of MLS models try to precisely observe data manipulations in order to prevent illegal information flows. Flume [8], and Histar [15] are modern implementations of information flow control. Flume is an implementation of distributed information flow control (DIFC) for Linux, acting at the OS level, and using standard OS abstractions (processes, pipes, .…”
Section: Background and Related Workmentioning
confidence: 99%