Language-based information-flow security

被引:955
作者
Sabelfeld, A [1 ]
Myers, AC [1 ]
机构
[1] Cornell Univ, Comp Sci Dept, Ithaca, NY 14853 USA
基金
美国国家科学基金会;
关键词
computer security; concurrency; confidentiality; covert channels; information flow; noninterference; security policies; security-type systems;
D O I
10.1109/JSAC.2002.806121
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies. Recently, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies. In this paper, we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies. We give a structured view of recent work in the area and identify some important open challenges.
引用
收藏
页码:5 / 19
页数:15
相关论文
共 147 条
[1]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[2]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[3]  
Abadi M., 1997, Theoretical Aspects of Computer Software. Third International Symposium, TACS '97. Proceedings, P611, DOI 10.1007/BFb0014571
[4]  
ABADI M, 2001, LECT NOTES COMPUTER, V2030, P25
[5]  
Abadi M., 1996, A Theory Of Objects, DOI DOI 10.1007/978-1-4419-8598-9
[6]  
ABRAMKSY S, 1998, LOG COMP P 1997 MARK
[7]   On confidentiality and algorithms [J].
Agat, J ;
Sands, D .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :64-77
[8]  
Agat J., 2000, THESIS CHALMERS U TE
[9]  
ALDINI A, 2001, LNCS, V2154, P152
[10]  
Andrassy I., 1956, Archivum Zoologicum Budapest, V2, P1