About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Book chapter

Secure Guarded Commands

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Formal Methods, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

We develop a lightweight approach to information flow control that interacts with the use of cryptographic schemes. The language is a version of Dijkstra’s Guarded Commands language extended with parallelism, communication and symmetric cryptography. Information flow is modelled using security labels that are sets of hashed symmetric keys expressing the capabilities needed for access to data.

In essence, encryption is used to encapsulate the protection offered by the information flow policy. We develop a type system aimed at tracking explicit, implicit, bypassing and correlation flows arising due to the parallel processes and the internal non-determinism inherent in Guarded Commands. The development is facilitated by the parallel processes having disjoint memories and is illustrated on a multiplexer scenario previously addressed using content-dependent information flow policies.

Language: English
Publisher: Springer
Year: 2020
Pages: 201-215
Series: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Journal subtitle: Essays Dedicated To Chris Hankin on the Occasion of His Retirement
ISBN: 3030411028 , 3030411036 , 9783030411022 and 9783030411039
ISSN: 03029743
Types: Book chapter
DOI: 10.1007/978-3-030-41103-9_7
ORCIDs: Nielson, Flemming and Nielson, Hanne Riis

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis