Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3525))

  • 835 Accesses

Abstract

Characterising the fundamental concepts of information security, such as confidentiality and authentication, has proved problematic from the outset and remains controversial to this day. Non-interference was proposed some 25 years ago to give a precise, formal characterisation of the absence of information flows through a system, motivated in large part by the discovery of “covert channels” in access control models such as Bell-LaPadula. Intuitively, it asserts that altering High’s interactions with a system should not result in any observable difference in Low’s interactions with the system. Superficially it appears to be a very natural and compelling concept but it turns out to harbor some surprising subtleties.

Over the years various models of computation have been used to formalise non-interference. Typically these floundered on non-determinism, ”input/output” distinctions, input totality and so forth. In the late 80’s and early 90’s, process algebras, in particular CSP, were applied to information security. In this talk I will briefly overview this approach and discuss how the concepts and results from process algebra shed light on these haunted corners of non-interference, including the role of non-determinism, unwinding results, composition, refinement and input/output distinctions. In particular, we argue that the absence of information flow can be characterised in terms of process equivalence, itself a delicate and fundamental concept.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goguen, J.A., Meseguer, J.: Security policies and security models. IEEE Symposium on Security and Privacy (1982)

    Google Scholar 

  2. Goguen, J., Meseguer, J.: Inference Control and Unwinding. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1984)

    Google Scholar 

  3. Lowe, G.: Defining Information Flow University of Leicester tech report (1999)

    Google Scholar 

  4. Roscoe, A.W., Woodcock, J., Wulf, L.: Non-interference through determinism. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 33–53. Springer, Heidelberg (1994)

    Google Scholar 

  5. Ryan, P.Y.A.: A CSP formulation of non-interference and unwinding. In: Presented at CSFW 1990 and published in Cipher, Winter 1990/2000

    Google Scholar 

  6. Ryan, P.Y.A., Schneider, S.A.: Process Algebra and Non-interference. In: JCS 2001 (2001)

    Google Scholar 

  7. Schneider, S.A., Sidiropoulos, A.: CSP and anonymity. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 222–237. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Ryan, P. (2005). Shedding Light on Haunted Corners of Information Security. In: Abdallah, A.E., Jones, C.B., Sanders, J.W. (eds) Communicating Sequential Processes. The First 25 Years. Lecture Notes in Computer Science, vol 3525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11423348_15

Download citation

  • DOI: https://doi.org/10.1007/11423348_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25813-1

  • Online ISBN: 978-3-540-32265-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics