Skip to main content

Transforming Processes to Check and Ensure Information Flow Security*

  • Conference paper
  • First Online:
Algebraic Methodology and Software Technology (AMAST 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2422))

Abstract

Persistent BNDC (P BNDC for short) is an information- flow securitypro perty for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. We propose a method for transforming an arbitrary process into a process satisfying P_BNDC and show that the transformation preserves the “low level” observational semantics for a large class of processes. We also study how to efficiently verify P_BNDC by exploiting a characterization of it through a suitable notion of weak bisimulation up to high level actions. We define a second transformation over processes which allows us to reduce the problem of checking P_BNDC to the problem of testing a weak bisimulation between two processes. This approach is particularly appealing as it allows us to perform the P_BNDC check using already existing tools at a low time complexity.

This work has been partiallys upported by the MURST project “Modelli formali per la sicurezza” and the EU Contract IST-2001-32617 “Models and Types for Security in Mobile Distributed Systems” (MyThS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749–786, 1999.

    Article  MATH  MathSciNet  Google Scholar 

  2. A. Aldini. Probabilistic information flow in a process algebra. In Proc. of the 12th International Conference on Concurrency Theory (CONCUR’01), pages 152–168. Springer LNCS 2154, August 2001.

    Google Scholar 

  3. C. Bodei, P. Degano, R. Focardi, and C. Priami. Primitives for Authentication in Process Algebras. Theoretical Computer Science, 2001. To appear.

    Google Scholar 

  4. T. Bolognesi and S. A. Smolka. Fundamental results for the verification of observational equivalence: A survey. In H. Rudin and C. H. West, editors, Prooc. of Int’l Conference on Protocol Specification, Testing and Verification (PSTV’87), pages 165–179. North-Holland, 1987.

    Google Scholar 

  5. N. A. Durgin, J. C. Mitchell, and D. Pavlovic. A Compositional Logic for Protocol Correctness. In Proc. of of the 14th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2001.

    Google Scholar 

  6. R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification if Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550–571, 1997.

    Article  Google Scholar 

  7. R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer, 2001.

    Google Scholar 

  8. R. Focardi, R. Gorrieri, and F. Martinelli. Information-flow analysis in a discretetime process algebra. In Proc. of of the 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2001.

    Google Scholar 

  9. R. Focardi, C. Piazza, and S. Rossi. Proof methods for bisimulation based information flow security. In A. Cortesi, editor, Proc. of Int. Workshop on Verification, Model Checking and Abstract Interpretation, LNCS. Springer, 2002.

    Google Scholar 

  10. R. Focardi and S. Rossi. Information flow security in dynamic contexts. In Proc. of of the 15th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2002.

    Google Scholar 

  11. J. A. Goguen and J. Meseguer. Security Policy and Security Models. In Proc. of the 1982 Symposium on Security and Privacy, pages 11–20. IEEE Computer Society Press, 1982.

    Google Scholar 

  12. Jan Jürjens. Secure information flow for concurrent processes. In Proc. of International Conference on Concurrency Theory (Concur 2000). LNCS 1877, Springer-Verlag, August 2000.

    Google Scholar 

  13. Heiko Mantel and Andrei Sabelfeld. A generic approach to the security of multithreaded programs. In Proc. of of the 14th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2001.

    Google Scholar 

  14. D. McCullough. “A Hookup Theorem for Multilevel Security”. IEEE Transactions on Software Engineering, pages 563–568, June 1990.

    Google Scholar 

  15. J. McLean. “A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions”. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1994.

    Google Scholar 

  16. R. Milner. Communication and Concurrency. Prentice-Hall, 1989.

    Google Scholar 

  17. L. C. Paulson. Proving Properties of Security Protocols by Induction. In Proc. of the IEEE Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, 1997.

    Google Scholar 

  18. Roberto Gorrieri Riccardo Focardi and Roberto Segala. A new definition of multilevel security. In Proc. of Workshop on Issues in the Theory of Security (WITS’ 00), (P. Degano, ed.), July 2000.

    Google Scholar 

  19. A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proc. of the IEEE Computer Security Foundations Workshop, pages 200–215. IEEE Computer Society Press, 2000.

    Google Scholar 

  20. S. Schneider. Verifying Authentication Protocols in CSP. IEEE Transactions on Software Engineering, 24(9), 1998.

    Google Scholar 

  21. V. Shmatikov and J. C. Mitchell. Analysis of a Fair Exchange Protocol. In Proc. of 7th Annual Symposium on Network and Distributed System Security (NDSS 2000), pages 119–128. Internet Society, 2000.

    Google Scholar 

  22. G. Smith and D. M. Volpano. Secure Information Flow in a Multi-threaded Imperative Language. In Proc. of 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL98), pages 355–364. ACM Press, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bossi, A., Focardi, R., Piazza, C., Rossi, S. (2002). Transforming Processes to Check and Ensure Information Flow Security* . In: Kirchner, H., Ringeissen, C. (eds) Algebraic Methodology and Software Technology. AMAST 2002. Lecture Notes in Computer Science, vol 2422. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45719-4_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-45719-4_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44144-1

  • Online ISBN: 978-3-540-45719-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics