Flow based interpretation of access control: Detection of illegal information flows - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Flow based interpretation of access control: Detection of illegal information flows

Résumé

In this paper, we introduce a formal property characterizing access control policies for which the interpretations of access control as mechanism over objects and as mechanism over information contained into objects are similar. This leads us to define both a flow based interpretation of access control policies and the information flows generated during the executions of a system implementing an access control mechanism. When these two interpretations are not equivalent, we propose to add a mechanism dedicated to illegal information flow detection to the mechanism of access control over objects. Such a mechanism is parameterized by the access control policy and is proved sound and complete. Finally, we briefly describe two real implementations, at two levels of granularity, of our illegal flow detection mechanism: one for the Linux operating system and one for the Java Virtual Machine. We show that the whole approach is effective in detecting real life computer attacks.

Dates et versions

hal-00647170 , version 1 (01-12-2011)

Identifiants

Citer

Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé. Flow based interpretation of access control: Detection of illegal information flows. 7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩. ⟨hal-00647170⟩
462 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More