SENSORIA All Publications |
|
Copyright Information
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of
scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other
copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying
this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without
the explicit permission of the copyright holder.
show main publications
Locality-based Security Policies @INPROCEEDINGS{TolNie:Locality2006, title = {{Locality-based Security Policies}}, author = {{Terkel} {Tolstrup} and {Flemming} {Nielson} and {Ren\'e Rydhof} {Hansen}}, booktitle = {Proceedings of the 4th international Workshop on Formal Aspects in Security and Trust (FAST2006)}, abstract = {Information flow security provides a strong notion of end-to-end security in computing systems. However, somtimes the policies for information flow security are limited in their expressive power, hence complicating the matter of specifying policies even for simple systems. These limitations often become apparent in contexts where confidential information is released under specific conditions. \ We present a novel policy language for expressing allowed information flow under elaborate constraints on the execution traces for programs. Based on the policy language we propose a security condition shown to be a generalized intransitive non-interference condition. Furthermore, a emphflow-logic based static analysis is presented and shown capable of arguing the security of analysed programs.}, year = {2006}, invited = {N}, partner = {DTU}, status = {private}, task = {T3.1}, }
|