Prudent Design Principles for Information Flow Control
Paper in proceeding, 2018
This paper puts forward six informal principles for designing information flow security definitions and enforcement mechanisms: attacker-driven security, trust-aware enforcement, separation of policy annotations and code, language-independence, justified abstraction, and permissiveness. We particularly highlight the core principles of attacker-driven security and trust-aware enforcement, giving us a rationale for deliberating over soundness vs. soundiness. The principles contribute to roadmapping the state of the art in information flow security, weeding out inconsistencies from the folklore, and providing a rationale for designing information flow characterizations and enforcement mechanisms for new application domains.
attacker models
information flow control
principles
Author
Iulia Bastys
Chalmers, Computer Science and Engineering (Chalmers), Information Security
Frank Piessens
KU Leuven
Andrei Sabelfeld
Chalmers, Computer Science and Engineering (Chalmers), Information Security
Proceedings of the ACM Conference on Computer and Communications Security
15437221 (ISSN)
17-23978-1-4503-5993-1 (ISBN)
Toronto, Canada,
Subject Categories
Computer and Information Science
DOI
10.1145/3264820.3264824
ISBN
9781450359931