Benign Interaction of Security Domains

Flemming Nielson*, René Rydhof Hansen, Hanne Riis Nielson

*Corresponding author for this work

Research output: Contribution to book/anthology/report/conference proceedingBook chapterResearchpeer-review

Abstract

Whenever data is communicated outside a security domain there is the risk that it may influence data coming back in a way that is not permitted by the security domain. This may arise when different security domains relate to different parallel processes that exchange information through communication. We provide general definitions of the demands on the communication and sanitisation primitives so as to mitigate the risk. For interesting instantiations of these definitions we provide algorithms for checking that the demands have been met. The development is illustrated by a worked example dealing with the outsourcing of data management to the cloud.

Original languageEnglish
Title of host publicationProtocols, Strands, and Logic : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday
EditorsDaniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul Rowe
Number of pages20
PublisherSpringer
Publication date2021
Pages312-331
ISBN (Electronic)978-3-030-91631-2
DOIs
Publication statusPublished - 2021
SeriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13066 LNCS
ISSN0302-9743

Bibliographical note

Publisher Copyright:
© 2021, Springer Nature Switzerland AG.

Fingerprint

Dive into the research topics of 'Benign Interaction of Security Domains'. Together they form a unique fingerprint.

Cite this