Skip to main content

Information Flow Security for Interactive Systems

  • Conference paper
Embedded and Ubiquitous Computing – EUC 2005 (EUC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3824))

Included in the following conference series:

  • 680 Accesses

Abstract

The use of the Internet raises serious behavioural issues regarding, for example, security and the interaction among agents that may travel across links. Model-building such interactive systems is one of the biggest current challenges in computer science. A general model, action calculi, has been introduced by Robin Milner to unify the various emerging disciplines of interactive behaviour. In this paper action calculi is used as an abstraction of interactive systems and information flow security properties of such systems are studied. At first an information flow analysis for static action calculi is presented to predict how data will flow both along and inside actions and its correctness is proved; Next basing on the result of the analysis information security properties of both static and dynamic action calculi are discussed; Finally a general relationship are established between the static notation of information flow security and the dynamic one.

This paper is sponsored by Jilin Province Science and Technology Development Plan Project (No. 20050527).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bodel, C., Deggan, P., Nielson, F., Riis Nielson, H.: Static Analysis for the π-calculus with Applications to Security, Available at: http://www.di.unipi.it/~chiars/publ-40/BDNN100.ps

  2. Bodei, C., Degano, P., Nielson, F., Riis Nielson, H.: Control flow analysis for the π-calculus. In: Sangiorgi, D., de Simone, R. (eds.) CONCUR 1998. LNCS, vol. 1466, pp. 84–98. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Degano, P., Levi, F., Bodei, C.: Safe Ambients: Control Flow Analysis and Security. In: He, J., Sato, M. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199–214. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Gasser, K.L.S., Nielson, F., Nielson, H.R.: Systematic realization of control flow analysis for CML. In: Proceedings of ICFP 1997, pp. 38–51. ACM Press, New York (1997)

    Chapter  Google Scholar 

  5. Gardner, P.: Closed Action Calculi. Theoretical Computer Science, vol. 228 (1999)

    Google Scholar 

  6. Milner, R.: Action calculi, or concrete action structures. In: MFCS 1993. LNCS, vol. 711, pp. 105–121. Springer, Heidelberg (1993)

    Google Scholar 

  7. Milner, R.: Action Calculi IV: Molecular forms, Computer Sciences Department, University of Edinburgh. Draft (1993)

    Google Scholar 

  8. Milner, R.: Calculi for Interaction. Acta Inform. 33(8), 707–737 (1996)

    Article  MathSciNet  Google Scholar 

  9. Crafa, S., Bugliesi, M., Castagna, G.: Information Flow Security in Boxed Ambients. Electronic Notes in Theoretical Computer Science 66(3) (2003)

    Google Scholar 

  10. Jin, Y., Jin, C.: Encoding Gamma Calculus in Action Calculus. Journal of Software 14(1) (January 2003)

    Google Scholar 

  11. Jin, Y., Jin, C.: Representing Imperative Language in Higher-order Action Calculus. Journal of Computer Research and Development 39(10) (October 2002)

    Google Scholar 

  12. Focardi, R.: Analysis and Automatic Detection of Information Flows in Systems and Networks. PhD thesis, Unviersity of Bologna (Italy) (1999)

    Google Scholar 

  13. Focardi, R., Gorrieri, R., Martinelli, F.: Information Flow Analysis in a Discrtete Time Process Algebra. In: Syverson, P. (ed.) Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW13), pp. 170–184. IEEE CS Press, Los Alamitos (2000)

    Chapter  Google Scholar 

  14. Focardi, R., Gorrieri, R., Segala, R.: A New Definition of Security Properties. In: Proceedings of Workshop on Issues in the Theory of Security (WITS 2000), University of Geneva (July 2000)

    Google Scholar 

  15. Mantel, H., Sabelfeld, A.: A Unifying Approach to Security of Distributed and Multi-Threaded Programs. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada (June 2001)

    Google Scholar 

  16. Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal of Selected Areas in Commnications 21(1) (January 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, Y., Liu, L., Zheng, Xj. (2005). Information Flow Security for Interactive Systems. In: Yang, L.T., Amamiya, M., Liu, Z., Guo, M., Rammig, F.J. (eds) Embedded and Ubiquitous Computing – EUC 2005. EUC 2005. Lecture Notes in Computer Science, vol 3824. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596356_104

Download citation

  • DOI: https://doi.org/10.1007/11596356_104

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30807-2

  • Online ISBN: 978-3-540-32295-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics