Presentation | 2006-07-20 On Enforcement of Noninterference Naoyuki NAGATOU, Takuo WATANABE, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We discuss a characterization of security policies to be enforced with a monitor. The monitor is a enforcement mechanism that work by observing a behavior of a program and terminating its execution if it violates a security policy being enforced. Unfortunately, the monitors is able to enforce not all of security policies in order to limit to observe for a finite behavior and not to use future informations. F.B.Schneider show that policies having the trait become to satisfy Lamport's safety property. Also, there exist Biichi automata to recognize the safety properties and he calls them security automata. Therefore we introduce automata using more information and show that these automata can enforce information flow policies with respect to noninterference. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Noninterference / Noninference / Covert Channel / Security Policy / Access Control |
Paper # | ISEC2006-37,SITE2006-34 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2006/7/13(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | On Enforcement of Noninterference |
Sub Title (in English) | |
Keyword(1) | Noninterference |
Keyword(2) | Noninference |
Keyword(3) | Covert Channel |
Keyword(4) | Security Policy |
Keyword(5) | Access Control |
1st Author's Name | Naoyuki NAGATOU |
1st Author's Affiliation | Department of Computer Science, Graduate School of Information Science and Engineering, Tokyo Institute of Technology() |
2nd Author's Name | Takuo WATANABE |
2nd Author's Affiliation | Department of Computer Science, Graduate School of Information Science and Engineering, Tokyo Institute of Technology |
Date | 2006-07-20 |
Paper # | ISEC2006-37,SITE2006-34 |
Volume (vol) | vol.106 |
Number (no) | 174 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |