skip to main content
10.1145/1456403.1456418acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Avoiding information leakage in security-policy-aware planning

Published: 27 October 2008 Publication History

Abstract

In early computer systems only simple actions would be governed by security policies. However, computers are increasingly handling complex organizational tasks which may have complex preconditions and postconditions. As such, it is useful to be able to plan and schedule actions in advance in order to ensure that desired actions will be able to be carried out without violating the security policy. However, there is a possibility that planning systems could accidentally leak information about future plans which should be kept confidential. In this paper, we investigate how sensitive information could be leaked by a planning system which uses security policies to ensure that planned actions will be able to occur. We formally define information leakage in this context. Then we present two techniques which can be used to mitigate or eliminate this information leakage and prove their security.

References

[1]
J. Goguen and J. Meseguer. Security policies and security models. In IEEE Symposium on Security and Privacy, Oakland, CA, April 1982.
[2]
Rachel Greenstadt and Michael D. Smith. Collaborative scheduling: Threats and promises. In Workshop on the Economics of Information Security, Cambridge, UK, June 2006.
[3]
K. Irwin, T. Yu, and W. H. Winsborough. On the Modeling and Analysis of Obligations. In ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 2006.
[4]
Sushil Jajodia and Ravi S. Sandhu. Toward a multilevel secure relational data model. In Marshall D. Abrams, Sushil Jajodia, and Harold J. Podell, editors, Information Security: An Integrated Collection of Essays. 1994.
[5]
Sushil Ja jodia, Ravi S. Sandhu, and Barbara T. Blaustein. Solutions to the polyinstantiation problem. In Marshall D. Abrams, Sushil Jajodia, and Harold J. Podell, editors, Information Security: An Integrated Collection of Essays. 1994.
[6]
H. Mantel. Possibilistic definition of security - an assembly kit. In IEEE Computer Security Foundations Workshop, July 2000.
[7]
John McLean. Security models. In John Marciniak, editor, Encyclopedia of Software Engineering. 1994.
[8]
John McLean. A general theory of composition for a class ''possibilistic'' security properties. IEEE Transactions on Software Engineering, 22(1), January 1996.
[9]
Andrew C. Myers. Jflow: Practical mostly-static information flow control. In ACM Symposium on principles of Programming Languages (POPL), San Antonio, TX, January 1999.
[10]
Andrei Sabelfeld and Andrew C. Myers. Language--based information flow security. IEEE Journal on Selected Areas in Communications, 21(1), January 2003.
[11]
Vincent Simonet. Flow Caml in a nutshell. In Graham Hutton, editor, Proceedings of the first APPSEM-II workshop, pages 152--165, Nottingham, United Kingdom, March 2003.
[12]
D. Garvey Thomas and Teresa F. Lunt. Cover stories for database security. In IFIP WG 11.3 Workshop on Database Security, Shepherdstown, WV, November 1991.
[13]
Tom Wagner. Coordination decision support assistants (coordinators). http://www.darpa.mil/ipto/programs/coor/coor_concept.asp

Cited By

View all

Index Terms

  1. Avoiding information leakage in security-policy-aware planning

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society
      October 2008
      128 pages
      ISBN:9781605582894
      DOI:10.1145/1456403
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. obligations
      2. policy
      3. scheduling

      Qualifiers

      • Research-article

      Conference

      CCS08
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 106 of 355 submissions, 30%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media