Abstract
The use of the Internet raises serious behavioural issues regarding, for example, security and the interaction among agents that may travel across links. Model-building such interactive systems is one of the biggest current challenges in computer science. A general model, action calculi, has been introduced by Robin Milner to unify the various emerging disciplines of interactive behaviour. In this paper action calculi is used as an abstraction of interactive systems and information flow security properties of such systems are studied. At first an information flow analysis for static action calculi is presented to predict how data will flow both along and inside actions and its correctness is proved; Next basing on the result of the analysis information security properties of both static and dynamic action calculi are discussed; Finally a general relationship are established between the static notation of information flow security and the dynamic one.
This paper is sponsored by Jilin Province Science and Technology Development Plan Project (No. 20050527).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bodel, C., Deggan, P., Nielson, F., Riis Nielson, H.: Static Analysis for the π-calculus with Applications to Security, Available at: http://www.di.unipi.it/~chiars/publ-40/BDNN100.ps
Bodei, C., Degano, P., Nielson, F., Riis Nielson, H.: Control flow analysis for the π-calculus. In: Sangiorgi, D., de Simone, R. (eds.) CONCUR 1998. LNCS, vol. 1466, pp. 84–98. Springer, Heidelberg (1998)
Degano, P., Levi, F., Bodei, C.: Safe Ambients: Control Flow Analysis and Security. In: He, J., Sato, M. (eds.) ASIAN 2000. LNCS, vol. 1961, pp. 199–214. Springer, Heidelberg (2000)
Gasser, K.L.S., Nielson, F., Nielson, H.R.: Systematic realization of control flow analysis for CML. In: Proceedings of ICFP 1997, pp. 38–51. ACM Press, New York (1997)
Gardner, P.: Closed Action Calculi. Theoretical Computer Science, vol. 228 (1999)
Milner, R.: Action calculi, or concrete action structures. In: MFCS 1993. LNCS, vol. 711, pp. 105–121. Springer, Heidelberg (1993)
Milner, R.: Action Calculi IV: Molecular forms, Computer Sciences Department, University of Edinburgh. Draft (1993)
Milner, R.: Calculi for Interaction. Acta Inform. 33(8), 707–737 (1996)
Crafa, S., Bugliesi, M., Castagna, G.: Information Flow Security in Boxed Ambients. Electronic Notes in Theoretical Computer Science 66(3) (2003)
Jin, Y., Jin, C.: Encoding Gamma Calculus in Action Calculus. Journal of Software 14(1) (January 2003)
Jin, Y., Jin, C.: Representing Imperative Language in Higher-order Action Calculus. Journal of Computer Research and Development 39(10) (October 2002)
Focardi, R.: Analysis and Automatic Detection of Information Flows in Systems and Networks. PhD thesis, Unviersity of Bologna (Italy) (1999)
Focardi, R., Gorrieri, R., Martinelli, F.: Information Flow Analysis in a Discrtete Time Process Algebra. In: Syverson, P. (ed.) Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW13), pp. 170–184. IEEE CS Press, Los Alamitos (2000)
Focardi, R., Gorrieri, R., Segala, R.: A New Definition of Security Properties. In: Proceedings of Workshop on Issues in the Theory of Security (WITS 2000), University of Geneva (July 2000)
Mantel, H., Sabelfeld, A.: A Unifying Approach to Security of Distributed and Multi-Threaded Programs. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada (June 2001)
Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE Journal of Selected Areas in Commnications 21(1) (January 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jin, Y., Liu, L., Zheng, Xj. (2005). Information Flow Security for Interactive Systems. In: Yang, L.T., Amamiya, M., Liu, Z., Guo, M., Rammig, F.J. (eds) Embedded and Ubiquitous Computing – EUC 2005. EUC 2005. Lecture Notes in Computer Science, vol 3824. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596356_104
Download citation
DOI: https://doi.org/10.1007/11596356_104
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30807-2
Online ISBN: 978-3-540-32295-5
eBook Packages: Computer ScienceComputer Science (R0)