Protecting privacy using the decentralized label model

作者: Andrew C. Myers , Barbara Liskov

DOI: 10.1145/363516.363526

关键词: Data sharingDeclassificationComputer scienceDistributed computingJavaLanguage-based securityStatic program analysisMultilevel securityConfidentialityComputer securitySecurity policy

摘要: Stronger protection is needed for the confidentiality and integrity of data, because programs containing untrusted code are rule rather than exception. Information flow control allows enforcement end-to-end security policies, but has been difficult to put into practice. This article describes decentralized label model, a new model information in systems with mutual distrust authority. The improves on existing multilevel models by allowing users declassify way, improving support fine-grained data sharing. It supports static program analysis flow, so that can be certified permit only acceptable flows, while largely avoiding overhead run-time checking. introduces language Jif, an extension Java provides checking using model.

参考文章(47)
Karl Forster, Information protection system ,(2001)
Barbara Liskov, Andrew C. Myers, Mostly-Static Decentralized Information Flow Control Massachusetts Institute of Technology. ,(1999)
Frank Yellin, Tim Lindholm, The Java Virtual Machine Specification ,(1996)
Terry Mayfield, John M. Boone, Stephen R. Welke, INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD National Computer Security Center (U.S.). ,(1991) , 10.21236/ADA253989
Ravi Sandhu, Role Hierarchies and Constraints for Lattice-Based Access Controls european symposium on research in computer security. pp. 65- 79 ,(1996) , 10.1007/3-540-61770-1_28
Jens Palsberg, Peter Ørbæk, Trust in the lambda-Calculus static analysis symposium. pp. 314- 329 ,(1995)
Jens Palsberg, Peter Ørbæk, Trust in the-calculus ,(1995)
Bill Joy, Guy Steele, James Gosling, Gilad Bracha, None, The Java Language Specification ,(1996)
Martín Abadi, Secrecy by Typing inSecurity Protocols international symposium on theoretical aspects of computer software. pp. 611- 638 ,(1997) , 10.1007/BFB0014571
J. A. Goguen, J. Meseguer, Security Policies and Security Models ieee symposium on security and privacy. pp. 11- 11 ,(1982) , 10.1109/SP.1982.10014