2008 21st IEEE Computer Security Foundations Symposium 2008
DOI: 10.1109/csf.2008.11
|View full text |Cite
|
Sign up to set email alerts
|

Tractable Enforcement of Declassification Policies

Abstract: Formalizing appropriate information policies that authorize some controlled form of information release, and providing sound analyses for these policies is a necessary step towards practical applications of language-based security.We propose a modular method to enhance noninterference type systems to support controlled forms of information release that combine the what and where dimensions of declassification. As a case study, we derive from earlier work on non-interference type systems new type systems that s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 33 publications
(39 reference statements)
0
15
0
Order By: Relevance
“…Our work, and in particular the notions of program equivalence we use, lay the foundations for designing flexible type systems for the full JVM. In the future, it would be interesting to extend the type system to exceptions (which are treated in [11]), declassification (in the style of [2]), and locks.…”
Section: Resultsmentioning
confidence: 99%
“…Our work, and in particular the notions of program equivalence we use, lay the foundations for designing flexible type systems for the full JVM. In the future, it would be interesting to extend the type system to exceptions (which are treated in [11]), declassification (in the style of [2]), and locks.…”
Section: Resultsmentioning
confidence: 99%
“…In the semantics of e.g. [BCR08] this would be deemed insecure because of the insecure subprogram ℓ := h -even though in all runs this subprogram will behave equivalently to the obviously secure program ℓ := ℓ. Similar examples can be constructed for all of the approaches cited above.…”
Section: The Flow Sensitivity Problemmentioning
confidence: 89%
“…As a simple example let us take a more recent declassification mechanism, delimited non-disclosure [BCR08]. In its simplest form we have variables of either High or Low security levels, and a local block-structured declassification command declassify h in c which allows a local weakening of the policy so that h is treated as low for the computation of command c. This is a variable-centric variant of Almeida Matos and Boudol's nondisclosure construct [AB05].…”
Section: Delimited Non-disclosurementioning
confidence: 98%
“…Type systems that are designed to prevent information laundering [44,2,7,33] reject the program above, because of the update to variable h on Line 3, and thus these type systems appear unsuitable for straightforward adaptation to progress sensitivity.…”
Section: Discussion and Related Workmentioning
confidence: 99%