Advertisement

Noninterference for Concurrent Programs

  • Gérard Boudol
  • Ilaria Castellani
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2076)

Abstract

We propose a type system to ensure the property of noninterference in a system of concurrent programs, described in a standard imperative language extended with parallelism. Our proposal is in the line of some recent work by Irvine, Volpano and Smith. Our type system, as well as our semantics for concurrent programs, seem more natural and less restrictive than those originally presented by these authors. Moreover, we show how to adapt the type system in order to preserve the noninterference results in the presence of scheduling policies, while remaining in a nonprobabilistic setting.

Keywords

Type System Schedule Policy Security Level Operational Semantic Concurrent Program 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749–786, 1999.zbMATHCrossRefMathSciNetGoogle Scholar
  2. [2]
    Gérard Boudol and Ilaria Castellani. Noninterference for concurrent programs. Research report, INRIA, 2001.Google Scholar
  3. [3]
    R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings ICALP’00, number 1853 in LNCS, 2000.Google Scholar
  4. [4]
    J. A. Goguen and J. Meseguer. Security policies and security models. In Proceedings 1982 IEEE Symposium on Security and Privacy, pages 11–20, 1982.Google Scholar
  5. [5]
    M. Hennessy. The security π-calculus and noninterference. Computer Science Technical Report 2000:05, University of Sussex, 2000.Google Scholar
  6. [6]
    M. Hennessy and J. Riely. Information flow vs resource access in the asynchronous pi-calculus (extended abstract). In Proceedings ICALP’00, number 1853 in LNCS, 2000.Google Scholar
  7. [7]
    K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In Proceedings ESOP’00, number 1782 in LNCS, 2000.Google Scholar
  8. [8]
    J. Millen. 20 years of covert channel modeling and analysis. In IEEE Symposium on Security and Privacy, 1999.Google Scholar
  9. [9]
    A. Myers. Jflow: Practical mostly-static information flow control. In 26th ACM Symposium on Principles of Programming Languages (POPL), 1999.Google Scholar
  10. [10]
    F. Pottier and S. Conchon. Information flow inference for free. In Proceedings ICFP’00, 2000.Google Scholar
  11. [11]
    A. Sabelfeld and D. Sands. Probabilistic noninterference for multi-threaded programs. In IEEE Computer Security Foundations Workshop, 2000.Google Scholar
  12. [12]
    G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In ACM, editor, Proceedings POPL’ 98, pages 355–364. ACM Press, 1998.Google Scholar
  13. [13]
    D. Volpano and G. Smith. A type-based approach to program security. In TAP-SOFT’97, number 1214 in LNCS, pages 607–621, 1997.Google Scholar
  14. [14]
    D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. Journal of Computer Security, 7(2-3), 1999.Google Scholar
  15. [15]
    D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167–187, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Gérard Boudol
    • 1
  • Ilaria Castellani
    • 1
  1. 1.INRIASophia-AntipolisFrance

Personalised recommendations