Possibilistic definitions of security-an assembly kit
- 7 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 3 (10636900) , 185-199
- https://doi.org/10.1109/csfw.2000.856936
Abstract
We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of security is formalized as a security predicate by assembling more primitive basic security predicates. A collection of such basic security predicates is defined and we demonstrate how well-known concepts like generalized non-interference or separability can be constructed from them. The framework is open and can be extended with new basic security predicates using a general schema. We investigate the compatibility of the assembled definitions with system properties apart from security and propose a new definition of security which does not restrict non-critical information flow. It turns out that the modularity of our framework simplifies these investigation. Finally, we discuss the stepwise development of secure systems.Keywords
This publication has 12 references indexed in Scilit:
- A general theory of composition for trace sets closed under selective interleaving functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The composability of non-interference [system security]Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Composing and decomposing systems under security propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A general theory of composition for a class of "possibilistic" propertiesIEEE Transactions on Software Engineering, 1996
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995
- Security models and information flowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A Universal Theory of Information FlowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Unwinding and Inference ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Secure Computer System: Unified Exposition and Multics InterpretationPublished by Defense Technical Information Center (DTIC) ,1976