Abstract
Intransitive non-interference (INI for short) is a behavioural property extensively studied by Rushby over deterministic automata with outputs associated to transitions (Mealy machines) in order to discuss the security of systems where declassification of secret information is allowed. In this paper, we first propose a natural transposition of Rushby’s definition on deterministic labelled transition systems, we call INI as well, and then an alternative, yet more easily checkable, formulation of INI, called NI with downgraders (NID for short). We show how NID can be naturally extended to the case of nondeterministic automata by using a variation of it based on bisimulation equivalence (BNID). The most novel contribution of this paper is the extension of this theory on the class of Petri nets called elementary net systems: we propose a semi-static technique, called PBNID and based on the inspection of the net structure, that is shown to be equivalent to BNID.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Best, E., Darondeau, P., Gorrieri, R.: On the Decidability of Non Interference over Unbounded Petri Nets. EPTCS 51, 16–33 (2010); Procs. SecCo 2010
Busi, N., Gorrieri, R.: A Survey on Non-Interference with Petri Nets. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) Lectures on Concurrency and Petri Nets. LNCS, vol. 3098, pp. 328–344. Springer, Heidelberg (2004)
Busi, N., Gorrieri, R.: Positive Non-Interference in Elementary and Trace Nets. In: Cortadella, J., Reisig, W. (eds.) ICATPN 2004. LNCS, vol. 3099, pp. 1–16. Springer, Heidelberg (2004)
Busi, N., Gorrieri, R.: Structural Non-Interference in Elementary and Trace Nets. Mathematical Structures in Computer Science 19(6), 1065–1090 (2009)
Bossi, A., Piazza, C., Rossi, S.: Modelling Downgrading in Information Flow Security. In: Procs. 17th IEEE Computer Security Foundations Workshop (CSFW 2004), pp. 187–201. IEEE Press, Los Alamitos (2004)
Engelfriet, J., Rozenberg, G.: Elementary Net Systems. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol. 1491, pp. 12–121. Springer, Heidelberg (1998)
Focardi, R., Gorrieri, R.: A Classification of Security Properties. Journal of Computer Security 3(1), 5–33 (1995)
Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering 23(9), 550–571 (1997)
Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331–396. Springer, Heidelberg (2001)
Frau, S., Gorrieri, R., Ferigato, C.: Structural Noninterference at Work: the Petri Net Security Checker. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210–225. Springer, Heidelberg (2009)
Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.M.: Characterizing Intransitive Noninterference for 3-Domain Security Policies With Observability. IEEE Transactions on Automatic Control 50(6), 920–925 (2005)
Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.M.: On the verification of intransitive noninterference in multilevel security. IEEE Transactions on Systems, Man, and Cybernetics, Part B 35(5), 948–958 (2005)
Haigh, J.T., Young, W.D.: Extending the noninterference version of MLS for SAT. IEEE Trans. on Software Engineering SE-13(2), 141–150 (1987)
Goguen, J.A., Meseguer, J.: Security Policy and Security Models. In: Proc. of Symposium on Security and Privacy (SSP 1982), pp. 11–20. IEEE CS Press, Los Alamitos (1982)
Goguen, J.A., Meseguer, J.: Unwinding and Inference Control. In: Proc. of Symposium on Security and Privacy (SSP 1984), pp. 75–86. IEEE CS Press, Los Alamitos (1984)
Lafrance, S., Mullins, J.: Bisimulation-based Nondeterministic Admissible Interference and ita Applications to the Analysis of Cryptographic Protocols. Information and Software Technology 45(11), 779–790 (2003); Preliminary version in Electronic Notes in Theoretical Computer Science 61, 1–24 (2002)
van der Meyden, R.: What, Indeed, Is Intransitive Noninterference? In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 235–250. Springer, Heidelberg (2007)
Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)
Mullins, J.: Nondeterministic Admissible Interference. Journal of Universal Computer Science 11, 1054–1070 (2000)
Pinsky, S.: Absorbing Covers and Intransitive Noninterference. In: Proc. of IEEE Symposium on Security and Privacy (SSP 1995), pp. 102–113. IEEE CS press, Los Alamitos (1995)
Pinsky, S., Zieglar, E.: Noninterference Equations for Nondeterministic Systems. In: Proc. of IEEE Computer Security Foundations Workshop (CSFW 2001), pp. 3–14. IEEE CS press, Los Alamitos (2001)
Roscoe, A.W., Goldsmith, M.-H.: What is Intransitive Noninterference? In: Proc. of 12th Computer Security Foundations Workshop (CSFW), pp. 228–238. IEEE CS Press, Los Alamitos (1999)
Rushby, J.: Noninterference, Transitivity, and Channel-control Security Policies. Technical Report CSL-92-02, SRI International (1992)
Ryan, P.Y.A.: Mathematical Models of Computer Security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 1–62. Springer, Heidelberg (2001)
Ryan, P.Y.A., Schneider, S.: Process Algebra and Noninterference. In: Proc. of 12th Computer Security Foundations Workshop (CSFW), pp. 214–227. IEEE CS Press, Los Alamitos (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Gorrieri, R., Vernali, M. (2011). On Intransitive Non-interference in Some Models of Concurrency. In: Aldini, A., Gorrieri, R. (eds) Foundations of Security Analysis and Design VI. FOSAD 2011. Lecture Notes in Computer Science, vol 6858. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23082-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-23082-0_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23081-3
Online ISBN: 978-3-642-23082-0
eBook Packages: Computer ScienceComputer Science (R0)