A Logical View of Secure Dependencies

作者: Pierre Bieber , Frédéric Cuppens

DOI: 10.3233/JCS-1992-1105

关键词:

摘要: In the context of modal logic security, confidentiality is defined by formula KBφ→RBφ that could be read “If B knows φ then should have permission to know φ”. We propose a new semantics for RB operator, such definition security would allow certain number dependencies (called secure dependencies) between objects system. formally compare this with non-interference, non-deducibility and generalized especially respect assumptions non-determinism input-totalness.

参考文章(14)
Mark E. Nadel, Joshua D. Guttman, What Needs Securing. ieee computer security foundations symposium. pp. 34- 57 ,(1988)
Jaakko Hintikka, Knowledge and belief ,(1962)
J. M. Rushby, Proof of separability: A verification technique for a class of a security kernels Proceedings of the 5th Colloquium on International Symposium on Programming. pp. 352- 367 ,(1982) , 10.1007/3-540-11494-7_23
Masahiko Sato, A study of Kripke-type models for some modal logics by Gentzen's sequential method Publications of the Research Institute for Mathematical Sciences. ,vol. 13, pp. 381- 468 ,(1977) , 10.2977/PRIMS/1195189814
J. Thomas Haigh, William D. Young, Extending The Non-Interference Version Of MLS For Sat ieee symposium on security and privacy. pp. 231- 231 ,(1986) , 10.1109/SP.1986.10004
Joseph Y. Halpern, Moshe Y. Vardi, The complexity of reasoning about knowledge and time. I. lower bounds symposium on the theory of computing. ,vol. 38, pp. 195- 237 ,(1989) , 10.1016/0022-0000(89)90039-1
Joseph A. Goguen, Jose Meseguer, Unwinding and Inference Control ieee symposium on security and privacy. pp. 75- 75 ,(1984) , 10.1109/SP.1984.10019
J. McLean, Security models and information flow ieee symposium on security and privacy. pp. 180- 187 ,(1990) , 10.1109/RISP.1990.63849
Daryl McCullough, Specifications for Multi-Level Security and a Hook-Up Property. ieee symposium on security and privacy. pp. 161- 166 ,(1987)
D. McCullough, Noninterference and the composability of security properties ieee symposium on security and privacy. pp. 177- 186 ,(1988) , 10.1109/SECPRI.1988.8110