Security Correctness for Secure Nested Transactions

作者: Dominic Duggan , Ye Wu

DOI: 10.1007/978-3-319-05119-2_5

关键词:

摘要: Secure nested transactions have been introduced as a synthesis of two long-standing lines research in computer security: security correctness for multilevel databases, and language-based security. The motivation is to consider information flow control certain classes concurrent applications. This article describes noninterference result secure transactions, based on observational equivalence. A semantics provided an extension the pi-calculus with $$\mathbf {Tau}_{\mathbf {One}}$$ calculus. novelty this constrained labelled transition system, where local rules place logical constraints global state transactional context. context described by notion logs, abstraction factoring out usual description processes. An advantage approach that it allows consideration properties such independently serializability.

参考文章(43)
Dominic Duggan, Ye Wu, Transactional correctness for secure nested transactions trustworthy global computing. pp. 179- 196 ,(2011) , 10.1007/978-3-642-30065-3_11
Andrei Sabelfeld, Heiko Mantel, Static Confidentiality Enforcement for Distributed Programs static analysis symposium. pp. 376- 394 ,(2002) , 10.1007/3-540-45789-5_27
Vijay Atluri, Sushil Jajodia, Binto George, Vijay Atluri, Sushil Jajodia, Binto George, Transaction Processing in Multilevel Secure Databases Multilevel Secure Transaction Processing. pp. 21- 41 ,(2000) , 10.1007/978-1-4615-4553-8_3
Silas Boyd-Wickizer, David Mazières, Nickolai Zeldovich, Securing distributed systems with information flow control networked systems design and implementation. pp. 293- 308 ,(2008)
Ariel Cohen, Ron van der Meyden, Lenore D. Zuck, Access Control and Information Flow in Transactional Memory formal aspects in security and trust. pp. 316- 330 ,(2009) , 10.1007/978-3-642-01465-9_21
Dennis Volpano, Geoffrey Smith, A Type-Based Approach to Program Security colloquium on trees in algebra and programming. pp. 607- 621 ,(1997) , 10.1007/BFB0030629
Roberto Gorrieri, Riccardo Focardi, Classification of Security Properties (Part I: Information Flow) FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures. ,vol. 2171, pp. 331- 396 ,(2000)
Silvia Crafa, Sabina Rossi, A theory of noninterference for the π-calculus trustworthy global computing. ,vol. 3705, pp. 2- 18 ,(2005) , 10.1007/11580850_2
Ron van der Meyden, What, Indeed, Is Intransitive Noninterference? Computer Security – ESORICS 2007. pp. 235- 250 ,(2007) , 10.1007/978-3-540-74835-9_16