2012 IEEE 25th Computer Security Foundations Symposium 2012
DOI: 10.1109/csf.2012.31
|View full text |Cite
|
Sign up to set email alerts
|

Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies

Abstract: In systems that handle confidential information, the security policy to enforce on information frequently changes: new users join the system, old users leave, and sensitivity of data changes over time. It is challenging, yet important, to specify what it means for such systems to be secure, and to gain assurance that a system is secure. We present a language-based model for specifying, reasoning about, and enforcing information security in systems that dynamically change the security policy. We specify securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(81 citation statements)
references
References 33 publications
0
81
0
Order By: Relevance
“…Namely, the observer is unable to learn more information than what is allowed at a given point while moving to a successive point of the same trace and possibly making a new observation. This model fits well with current knowledge-based approaches to information flow security [9,6,10], and, inspired by work of Guttman and Nadel [11], by being explicit about the information that needs to be protected, it allows a very general treatment of secret information, both as high level input and output events, and as relationships between events, say ordering, multiplicity, and interleaving. We show that several possibilistic conditions such as Separability, Generalized Noninterference, Nondeducibility, Nondeducibility on Outputs and Nondeducibility on Strategies are accurately reflected in the epistemic setting.…”
Section: Introductionmentioning
confidence: 53%
See 3 more Smart Citations
“…Namely, the observer is unable to learn more information than what is allowed at a given point while moving to a successive point of the same trace and possibly making a new observation. This model fits well with current knowledge-based approaches to information flow security [9,6,10], and, inspired by work of Guttman and Nadel [11], by being explicit about the information that needs to be protected, it allows a very general treatment of secret information, both as high level input and output events, and as relationships between events, say ordering, multiplicity, and interleaving. We show that several possibilistic conditions such as Separability, Generalized Noninterference, Nondeducibility, Nondeducibility on Outputs and Nondeducibility on Strategies are accurately reflected in the epistemic setting.…”
Section: Introductionmentioning
confidence: 53%
“…By contrast, this paper defines knowledge as the set of global traces that an agent considers possible based on his local observations. This allows us to give security conditions which are closer to what is used in language-based security [21,10,7]. Furthermore, the logic we present here captures directly the security properties of traces.…”
Section: Temporal Epistemic Logic With Pastmentioning
confidence: 95%
See 2 more Smart Citations
“…Knowledge-based conditions have also been used to provide intuitive semantics for dynamic information-flow policies [9], [62]. This is done by considering attackers that partially forget the observations made during the computation.…”
Section: Related Workmentioning
confidence: 99%