skip to main content
10.1145/1180337.1180339acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

P-congruences as non-interference for the pi-calculus

Published: 03 November 2006 Publication History

Abstract

We introduce a notion of noninterference for a typed version of the π-calculus where types are used to assign secrecy levels to channels. Noninterference is expressed in terms of a partial congruence(p-congruence, for short). We provide a proof technique in the form of a bisimulation-like partial equivalence relation that is a binary relation which is symmetric and transitive but not reflexive.We show that the noninterference property is compositional with respect to most of the operators of the language leading to efficient proof techniques for the verification and the construction of (compositional) secure systems.In order to allow downgrading of sensitive information, we extend the π-calculus with declassification primitives and we study a property which scales to noninterference when downgrading is not permitted.

References

[1]
A. Bossi, C. Piazza, and S. Rossi. Modelling Downgrading in Information Flow Security. In Proc. of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), pages 187--201. IEEE Computer Society Press, 2004.]]
[2]
S. Crafa and S. Rossi. Controlling Information Release in the π-calculus. Technical Report 14, Dipartimento di Matematica Pura e Applicata, Università DI Padova, Italy, 2005. http://www.math.unipd.it/~crafa/TR-14-05. ps.gz.]]
[3]
S. Crafa and S. Rossi. A Theory of Noninterference for the π-calculus. In Proceedings of the International Symposium on Trustworthy Global Computing (TGC'05), volume 3705 of LNCS, pages 2--18. Springer-Verlag, 2005.]]
[4]
R. Focardi and R. Gorrieri. A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1):5--33, 1994/1995.]]
[5]
R. Focardi and S. Rossi. Information Flow Security in Dynamic Contexts. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'02), pages 307--319. IEEE Computer Society Press, 2002.]]
[6]
J. A. Goguen and J. Meseguer. Security Policies and Security Models. In Proc. of the IEEE Symposium on Security and Privacy (SSP'82), pages 11--20. IEEE Computer Society Press, 1982.]]
[7]
A. D. Gordon and A. S. A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In Proc. of the 16th International Conference on Concurrency Theory, (CONCUR'05), volume 3653 of LNCS, pages 186--201. Springer-Verlag, 2005.]]
[8]
M. Hennessy. The security picalculus and non-interference. Journal of Logic and Algebraic Programming, 63(1):3--34, 2004.]]
[9]
M. Hennessy and J. Rathke. Typed Behavioural Equivalences for Processes in the Presence of Subtyping. Mathematical Structures in Computer Science, 14(5):651--684, 2004.]]
[10]
M. Hennessy and J. Riely. Information Flow vs. Resource Access in the Asynchronous Pi-calculus. ACM Transactions on Programming Languages and Systems (TOPLAS), 24(5):566--591, 2002.]]
[11]
K. Honda, V. Vasconcelos, and N. Yoshida. Secure Information Flow as Typed Process Behaviour. In Proc. of European Symposium on Programming (ESOP'00), volume 1782 of LNCS, pages 180--199. Springer-Verlag, 2000.]]
[12]
K. Honda and N. Yoshida. On Reduction-based Process Semantics. Theoretical Computer Science, 152(2):437--486, 1995.]]
[13]
K. Honda and N. Yoshida. A Uniform Type Structure for Secure Information Flow. In Proc. of ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'02), pages 81--92. ACM Press, 2002.]]
[14]
N. Kobayashi Type-Based Information Flow Analysis for the Pi-Calculus. Acta Informatica, 42(4--5):291--347, 2005.]]
[15]
F. Pottier. A simple view of type-secure information flow in the π-calculus. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'02), pages 320--330. IEEE Computer Society Press, 2002.]]
[16]
P. Ryan and S. Schneider. Process Algebra and Non-Interference. Journal of Computer Security, 9(1/2):75--103, 2001.]]
[17]
A. Sabelfeld and A. C. Myers. Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communication, 21(1):5--19, 2003.]]
[18]
A. Sabelfeld and D. Sands. A Per Model of Secure Information Flow in Sequential Programs. In Proc. of European Symposium on Programming (ESOP'99), volume 1576 of LNCS, pages 40--58. Springer-Verlag, 1999.]]
[19]
A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'00), pages 200--215. IEEE Computer Society Press, 2000.]]
[20]
A. Sabelfeld and D. Sands. Dimensions and principles of declassification. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'05), pages 255--269. IEEE Computer Society Press, 2005.]]
[21]
D. Sangiorgi and D. Walker. The pi calculus: A theory of mobile processes. Cambridge, 2001.]]
[22]
N. Yoshida, K. Honda, and M. Berger. Linearity and Bisimulation. In Proc. of the International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02), volume 2303 of LNCS, pages 417--434. Springer-Verlag, 2002.]]
[23]
S. Zdancewic and A. C. Myers. Observational Determinism for Concurrent Program Security. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'03), pages 29--45. IEEE Computer Society Press, 2003.]]

Cited By

View all
  • (2021)Session logical relations for noninterferenceProceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science10.1109/LICS52264.2021.9470654(1-14)Online publication date: 29-Jun-2021
  • (2018)Persistent Stochastic Non-InterferenceElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.276.6276(53-68)Online publication date: 24-Aug-2018
  • (2008)PicNIc - Pi-calculus non-interference checker2008 8th International Conference on Application of Concurrency to System Design10.1109/ACSD.2008.4574592(33-38)Online publication date: Jun-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security
November 2006
84 pages
ISBN:1595935509
DOI:10.1145/1180337
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. downgrading
  2. noninterference
  3. process calculi

Qualifiers

  • Article

Conference

CCS06
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Session logical relations for noninterferenceProceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science10.1109/LICS52264.2021.9470654(1-14)Online publication date: 29-Jun-2021
  • (2018)Persistent Stochastic Non-InterferenceElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.276.6276(53-68)Online publication date: 24-Aug-2018
  • (2008)PicNIc - Pi-calculus non-interference checker2008 8th International Conference on Application of Concurrency to System Design10.1109/ACSD.2008.4574592(33-38)Online publication date: Jun-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media