Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004.
DOI: 10.1109/csfw.2004.1310741
|View full text |Cite
|
Sign up to set email alerts
|

Modelling downgrading in information flow security

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(39 citation statements)
references
References 19 publications
0
39
0
Order By: Relevance
“…This work deals with the persistence dimension, but it is not clear how to generalize the definitions to policies richer than HDL. Gorrieri and Vernali [9] define similar notions of noninterference for the H → L and HDL policies on labelled transition systems and elementary Petri nets: the emphasis here is on the particularities of these semantic models rather than essential novelty in the semantics of security, where they essentially follow [5].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This work deals with the persistence dimension, but it is not clear how to generalize the definitions to policies richer than HDL. Gorrieri and Vernali [9] define similar notions of noninterference for the H → L and HDL policies on labelled transition systems and elementary Petri nets: the emphasis here is on the particularities of these semantic models rather than essential novelty in the semantics of security, where they essentially follow [5].…”
Section: Related Workmentioning
confidence: 99%
“…Bismulation-based definitions of security (an approach that is closely related to unwinding) are considered in the context of the very specific intransitive policy HDL in [5]. This work deals with the persistence dimension, but it is not clear how to generalize the definitions to policies richer than HDL.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, they are more suitable in contexts with partial trust, where it would be not realistic to assume that attackers are well typed in a strong way. Interestingly, we can increase the flexibility of our approach by admitting mechanisms for downgrading or declassifying information as done in [3] for CCS. This would allow the process h().ℓ to be deemed secure by declassifying the high action h().…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Mantel and Sand [7] have proposed to introduce a programming annotation for downgrading. Bossi et al [16] develop a theory of downgrading grounded in simulation-based notions of unwinding. Sabelfeld and Sands [17] lay out some general principles and direction for research in this area.…”
Section: Introductionmentioning
confidence: 99%