Title :
Practical information flow control in Web-based information systems
Author :
Li, Peng ; Zdancewic, Steve
Author_Institution :
Comput. & Inf. Sci., Pennsylvania Univ., Philadelphia, PA, USA
Abstract :
This paper presents a practical application of language-based information-flow control, namely, a domain-specific Web scripting language designed for interfacing with databases. The primary goal is to provide strong enforcement of confidentiality and integrity policies: confidential data can be released only in permitted ways and trustworthy data must result from expected computations or conform to expected patterns. Such security policies are specified in the database layer and statically enforced for the rest of the system in an end-to-end fashion. In contrast with existing Web-scripting languages, which provide only ad hoc mechanisms for information security, the scripting language described here uses principles based on the well-studied techniques in information-flow type systems. However, because Web scripts often need to downgrade confidential data and manipulated untrusted user input, they require practical and convenient ways of downgrading secure data. To achieve this goal, the language allows safe downgrading according to downgrading policies specified by the programmer. This novel, pattern-based approach provides a practical instance of recent work on delimited release and relaxed noninterference and extends that work by accounting for integrity policies.
Keywords :
Internet; data encapsulation; data integrity; data privacy; security of data; Web-based information systems; data confidentiality; data integrity; domain-specific Web scripting language; information security; information-flow type systems; language-based information flow control; pattern-based approach; security policies; Application software; Control systems; Data security; Database languages; Database systems; HTML; Information security; Information systems; Management information systems; Programming profession;
Conference_Titel :
Computer Security Foundations, 2005. CSFW-18 2005. 18th IEEE Workshop
Print_ISBN :
0-7695-2340-4
DOI :
10.1109/CSFW.2005.23