DocumentCode :
1642513
Title :
Information Flow in Credential Systems
Author :
Becker, Moritz Y.
Author_Institution :
Microsoft Res., Cambridge, UK
fYear :
2010
Firstpage :
171
Lastpage :
185
Abstract :
This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer any confidential fact within a policy. Two information flow properties that have been studied in the context of state transition systems, non-interference and opacity, are reformulated in the current context of policy languages. A comparison between these properties reveals that opacity is the more useful, and more general of the two; indeed, it is shown that non-interference can be stated in terms of opacity. The paper then presents an inference system for non-opacity, or detectability, in Datalog-based policies. Finally, a pragmatic method is presented, based on a mild modification of the mechanics of delegation, for preventing a particularly dangerous kind of probing attack that abuses delegation of authority.
Keywords :
DATALOG; authorisation; credential based declarative authorization policy; credential system; datalog based policy; information flow; policy language; state transition system; Cognition; Concrete; Context; Probes; Security; Semantics; Systematics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Symposium (CSF), 2010 23rd IEEE
Conference_Location :
Edinburgh
ISSN :
1940-1434
Print_ISBN :
978-1-4244-7510-0
Electronic_ISBN :
1940-1434
Type :
conf
DOI :
10.1109/CSF.2010.19
Filename :
5552645
Link To Document :
بازگشت