CPL - Chalmers Publication Library
| Utbildning | Forskning | Styrkeområden | Om Chalmers | In English In English Ej inloggad.

Unifying Facets of Information Integrity

Arnar Birgisson (Institutionen för data- och informationsteknik, Programvaruteknik (Chalmers)) ; Alejandro Russo (Institutionen för data- och informationsteknik, Programvaruteknik (Chalmers)) ; Andrei Sabelfeld (Institutionen för data- och informationsteknik, Programvaruteknik (Chalmers))
Springer LNCS Proceedings of Sixth International Conference on Information Systems Security (0302-9743). Vol. 6503 (2010), p. 48-65.
[Konferensbidrag, refereegranskat]

Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in different contexts include integrity via information flow, where the key is that trusted output is independent from untrusted input, and integrity via invariance, where the key is preservation of an invariant. Furthermore, integrity via invariance is itself multi-faceted. For example, the literature features formalizations of invariance as predicate preservation (predicate invariance), which is not directly compatible with invariance of memory values (value invariance). This paper offers a unified framework for integrity policies that include all of the facets above. Despite the different nature of these facets, we show that a straightforward enforcement mechanism adapted from the literature is readily available for enforcing all of the integrity facets at once.

Nyckelord: information security, information flow, integrity, program correctness



Denna post skapades 2010-11-23. Senast ändrad 2015-12-17.
CPL Pubid: 129456

 

Läs direkt!


Länk till annan sajt (kan kräva inloggning)


Institutioner (Chalmers)

Institutionen för data- och informationsteknik, Programvaruteknik (Chalmers) (2008-2010)

Ämnesområden

Programvaruteknik

Chalmers infrastruktur

Relaterade publikationer

Denna publikation ingår i:


Controlling Dependencies for Security and Privacy


Tracking Dependencies for Security and Privacy