Many-to-Many Information Flow Policies
Paolo Baldan
Università di Padova
Alessandro Beggiato
IMT Lucca
Alberto Lluch Lafuente
DTU
albl@dtu.dk
DisCoTec/COORDINATION 2017, Neuchâtel, 19-22 June 2017
Introduction
SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Sometimes one-to-one relations are not enough…
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
NETWORK
ENGINE
INFOTAINMENT
CONTROL
ENGINE
CONTROL
SCREENS
SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Sometimes one-to-one relations are not enough…
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
For example, to admit only…
• Paths ENGINE CONTROL→NET→ENGINE
NETWORK
ENGINE
INFOTAINMENT
CONTROL
ENGINE
CONTROL
SCREENS
SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Sometimes one-to-one relations are not enough…
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
For example, to admit only…
• Paths ENGINE CONTROL→NET→ENGINE
• Flows {SECRET,DECLASSIF.} → PUBLIC
NETWORK
ENGINE
INFOTAINMENT
CONTROL
ENGINE
CONTROL
SCREENS
SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Sometimes one-to-one relations are not enough…
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
For example, to admit only…
• Paths ENGINE CONTROL→NET→ENGINE
• Flows {SECRET,DECLASSIF.} → PUBLIC
• Flows from {SECRET} → {PUB1,PUB2}NETWORK
ENGINE
INFOTAINMENT
CONTROL
ENGINE
CONTROL
SCREENS
SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Sometimes one-to-one relations are not enough…
For example, to admit only…
• Paths ENGINE CONTROL→NET→ENGINE
• Flows {SECRET,DECLASSIF.} → PUBLIC
• Flows from {SECRET} → {PUB1,PUB2}
What does this mean at all?
How to regulate such flows?
How to keep a visual/intuitive notation?
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
NETWORK
ENGINE
INFOTAINMENT
CONTROL
ENGINE
CONTROL
SCREENS
Plan for today:
• Information flow and causality
• Why collective/simultaneous flows?
• Semantics of policies, by examples
• Some results
• Conclusion
Information flow
and causality
Alice Bob
Information flow and causal dependencies
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
...
...
Alice Bob
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
communication flow
...
...
Information flow and causal dependencies
Alice Bob
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
communication flow
explicit data flow...
...
Information flow and causal dependencies
Alice Bob
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
communication flow
explicit data flow
implicit data flow
...
...
Information flow and causal dependencies
Our models are labelled event structures, which consist of:
H L
Our models are labelled event structures, which consist of:
a set of security labels
disclose
read
L
request_secret
listen
ignore
Our models are labelled event structures, which consist of:
a set of security labels
a set of events
H
disclose
read
L
request_secret
listen
ignore
Our models are labelled event structures, which consist of:
a relation modelling causality (reflexive, transitive)
a set of security labels
a set of events
H
disclose
read
L
request_secret
listen
ignore
Our models are labelled event structures, which consist of:
a relation modelling causality (reflexive, transitive)
another relation modelling conflicts
(irreflexive, symmetric, inherited through causality)
a set of security labels
a set of events
H
disclose
H
L
POLICY
read
L
request_secret
listen
ignore
Policies are hyper graphs on the labels
H
A model satisfies the policy if every direct causal dependency
between different levels is justified by the policy.
disclose
H
L
POLICY
read
L
request_secret
listen
ignore
H
justified by
Policies are hyper graphs on the labels
unjustified!
A model satisfies the policy if every direct causal dependency
between different levels is justified by the policy.
disclose
H
L
POLICY
read
L
request_secret
listen
ignore
H
justified by
Policies are hyper graphs on the labels
unjustified!
How does this relate to existing approaches? Just restricting to
L→H there a huge families of possible semantics.
BNDC
(bisimulation-based NI)
RBNI
(structural NI)
SNNI
(trace-based NI)
[N. Busi, R. Gorrieri, “Structural non-interference in elementary and trace nets”, Mathematical Structures in Computer Science, 2009]
[N. Busi, R. Gorrieri, “A survey of non-interference with Petri nets”, Lectures on Concurrency and Petri Nets 2003]
[R. Focardi, R. Gorrieri, “A Classification of Security Properties”, Journal of Computer Security, 1995] 

• no H→L dependencies
• no H-L conflicts
Some notions of non-interference (allow L→H only) for safe Petri nets
• no H→L dependencies
• no direct H-L conflicts
• no H→L dependencies
( this paper)
l h
l
l h
System
h
lh
hl
Event
Structure
PetriNetTransition
System
Traces
l l
Low view
(only L)
l l
l h
l h
l l
l
Low view
(L+H)
Observational NI can miss H→L dependencies
(a resource transformed by H may be leaked to L)
l l
h
l l’
h
System Low view
(only L)
Low view
(L+H)
l l’
h
l
lh
Event
Structure
PetriNetTransition
System
Traces
l
l l
l’
l l’ l l’
l l’
Observational NI miss some H-L conflicts
(L may guess non occurrence of H-events)
Many-to-Many Information Flow Policies
Why more than
2 levels?
Sometimes you really need to disclose
Some information about passwords
is always leaked in login systems
disclose
H
Sometimes you really need to disclose
D
read
L
H
Leither you forbid this flow
or you relax the policy
POLICY
H
L
disclose
H
read
L
either you forbid this flow
or you relax the policy
POLICY
Sometimes you really need to disclose
H
L
disclose
H
read
L
H
L
D
POLICY
Disclosure from H to L
is allowed through a
declassifying level D
POLICY
✗
Sometimes you really need to disclose
H
L
check
disclose
H
Sometimes you really need to disclose
D
authorise
read
L
H
L
D
POLICY
Disclosure from H to L
is allowed through a
declassifying level D
POLICY
Why “collective”
flows?
disclose
H
H
L
D
POLICY
read
L
Disclosure from H to L
is allowed if it depends
on declassifying level D
✗
You may not require H and D to coordinate
disclose
H
D
H
L
D
POLICY
authorise
read
L
Disclosure from H to L
is allowed if it depends
on declassifying level D
✔
You may not require H and D to coordinate
Why “simultaneous”
flows?
POLICY
disclose
H
D
H
L
D
read
L
Disclosure from H to L
is allowed if also D is
influenced
✗
In some cases it would be ok for D to log the leaks
POLICY
disclose
H
D
H
L
D
record
read
L
Disclosure from H to L
is allowed if also D is
influenced
✔
In some cases it would be ok for D to log the leaks
Semantics of policies,
by examples
A
Flows allowed by a policy {A,B} E
B
A
E
B
POLICY
E
a
e
IDEA: A direct causality a e is allowed if …
A B
A
E
B
POLICY
E
a b
e
IDEA: A direct causality a e is allowed if it occurs in a context like this
INTUITION: Every time E listens to A, it also
needs to listen to B.
Flows allowed by a policy {A,B} E
B
A
E
B
POLICY
E
a
A
IDEA: A direct causality e a is allowed if …
e
Flows allowed by a policy E {A,B}
B
A
E
B
POLICY
E
INTUITION: Every time E talks to A, it also talks to B.
B may have other “unrelated” causal or conflict
dependencies.
a b
A
IDEA: A direct causality e a is allowed if it occurs in a context like this
•
e
Flows allowed by a policy E {A,B}
A
D
B
POLICYC
a
c
A
IDEA: A direct causality a c is allowed if …
C
Flows allowed by a policy {A,B} {C,D}
B
A
D
B
POLICYC
INTUITION: Every time A talks to B, it also talks to D
and B also talks to C and D.
a b
c
A
IDEA: A direct causality a c is allowed if it occurs in a context like this
•
C
D
d
Flows allowed by a policy {A,B} {C,D}
Some results
Relating/Relaxing Policies
Relating/Relaxing Policies
…adding/relaxing flows
Relating/Relaxing Policies
…adding/relaxing flows
…splitting the required flow sources
A B
C
A B
C
Relating/Relaxing Policies
…adding/relaxing flows
…splitting the required flow sources
…splitting the required flow targets
A B
C
A B
C
A
B C
A
B C
The most restrictive policy for a model may not be unique
A CB
a
c
b
The model satisfies both policies.
None of the policies can be
restricted for this model.
A B
POLICY
C
A B
POLICY
C
Example
Decidability for a class of event structures
Key ideas:
• Deciding FOL properties of a regular trace event structures is
decidable [Madhusudan, LICS 2013]
• Policy satisfaction can be encoded in FOL
Conclusion
What we have done:
• Focus on causality-based information flows
• Extend one-to-one policies (e.g. H→D→L,…)
• to many-to-many policies (e.g. {H,D}→L, H→{L,D},…)
• Study some semantic/decidability properties
Concluding remarks
What we have done:
• Focus on causality-based information flows
• Extend one-to-one policies (e.g. H→D→L,…)
• to many-to-many policies (e.g. {H,D}→L, H→{L,D},…)
• Study some semantic/decidability properties
What else is in the paper?
• Additional coordination constraints on the flows:
• directness
• fairness
• A case study and some application domains
Concluding remarks
What we have done:
• Focus on causality-based information flows
• Extend one-to-one policies (e.g. H→D→L,…)
• to many-to-many policies (e.g. {H,D}→L, H→{L,D},…)
• Study some semantic/decidability properties
What else is in the paper?
• Additional coordination constraints on the flows:
• directness
• fairness
• A case study and some application domains
What we are doing:
• More flexible “Causality Patterns” (see talk at ICE 2017)
• Verification for safe Petri nets / Static analysis for programs
• Consider the actual transfer of (the same) information
Concluding remarks
Thanks!

More Related Content

PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PDF
2022 KnowGraphs Winter School Presentation.pdf
PPTX
CISSP - Chapter 3 - System security architecture
PDF
3. Security Engineering
PPT
Security Policies
PDF
3. Security Engineering
PDF
3. Security Engineering
PDF
3. Security Engineering
CISSP Prep: Ch 4. Security Engineering (Part 1)
2022 KnowGraphs Winter School Presentation.pdf
CISSP - Chapter 3 - System security architecture
3. Security Engineering
Security Policies
3. Security Engineering
3. Security Engineering
3. Security Engineering

Similar to Many-to-Many Information Flow Policies (20)

PDF
CNIT 125 Ch 4. Security Engineering (Part 1)
PDF
CNIT 125: Ch 4. Security Engineering (Part 1)
PPT
Cryptography and Network Security Slide.
PPT
computer security presentation chapter 5
PDF
DPCL: a Language Template for Normative Specifications
PPT
Bell LAPadula Model and its importance in security mechnism.ppt
PPTX
DC MEETING I on 19.3.2024 design of context aware security model
PPTX
Preventing Information Flow with Jeeves - Singapore Data Privacy Workshop
PPT
Security models
PPTX
Security Architecture-Security Models
PDF
Cassandra distributed access control policies with tunable expressiveness
PDF
Modeling and Reasoning in Event Calculus using Goal-Directed Constraint Answe...
PDF
Cassandra flexible trust management, applied to electronic health records
PPT
Bell-LaPadula (1).ppt
PDF
The Science Of Quantitative Information Flow Mário S. Alvim
PPTX
Unit two concept of classes and objects
PPT
C&NS_FIREWALLS.ppt
PPT
Chapter 5-Security Mechanisms and Techniques.ppt
PPT
Knowledge_Representbhhggghhhhhhhtrrghjuuuuation.ppt
PDF
Lecture #4: Access Control Policies
CNIT 125 Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
Cryptography and Network Security Slide.
computer security presentation chapter 5
DPCL: a Language Template for Normative Specifications
Bell LAPadula Model and its importance in security mechnism.ppt
DC MEETING I on 19.3.2024 design of context aware security model
Preventing Information Flow with Jeeves - Singapore Data Privacy Workshop
Security models
Security Architecture-Security Models
Cassandra distributed access control policies with tunable expressiveness
Modeling and Reasoning in Event Calculus using Goal-Directed Constraint Answe...
Cassandra flexible trust management, applied to electronic health records
Bell-LaPadula (1).ppt
The Science Of Quantitative Information Flow Mário S. Alvim
Unit two concept of classes and objects
C&NS_FIREWALLS.ppt
Chapter 5-Security Mechanisms and Techniques.ppt
Knowledge_Representbhhggghhhhhhhtrrghjuuuuation.ppt
Lecture #4: Access Control Policies
Ad

More from Alberto Lluch Lafuente (16)

PDF
Aggregate Programming through a Soft Modal Logic
PDF
A Semiring-valued Temporal Logic
PDF
Can we efficiently verify concurrent programs under relaxed memory models in ...
PDF
Collaborative Task Execution In Volunteer Clouds (or how to choose a sub-revi...
PDF
State Space C-Reductions @ ETAPS Workshop GRAPHITE 2013
PDF
Adaptable Transition Systems @ ASCENS Meeting Prague 2013
PDF
White Box Adaptation @ CINA Meeting 2013
PDF
A White-box Perspective on Self-Adaptation and Self-Awareness (with a focus o...
PDF
State Space c-Reductions of Concurrent Systems in Rewriting Logic @ ETAPS Wor...
ODP
A conceptual framework for behavioural adaptation @ Leicester 2011
PDF
Evaluating the performance of model transformation styles with Maude @ Sympos...
PDF
A conceptual framework for behavioural adaptation @ Meeting ASCENS 2011
PDF
Maude .:° ASCENS 2011
PDF
IMT Welcome Day 2011
PDF
A Graph Syntax for Processes and Services @ Workshop WS-FM 2009
PDF
An Algebra of Hierarchical Graphs
Aggregate Programming through a Soft Modal Logic
A Semiring-valued Temporal Logic
Can we efficiently verify concurrent programs under relaxed memory models in ...
Collaborative Task Execution In Volunteer Clouds (or how to choose a sub-revi...
State Space C-Reductions @ ETAPS Workshop GRAPHITE 2013
Adaptable Transition Systems @ ASCENS Meeting Prague 2013
White Box Adaptation @ CINA Meeting 2013
A White-box Perspective on Self-Adaptation and Self-Awareness (with a focus o...
State Space c-Reductions of Concurrent Systems in Rewriting Logic @ ETAPS Wor...
A conceptual framework for behavioural adaptation @ Leicester 2011
Evaluating the performance of model transformation styles with Maude @ Sympos...
A conceptual framework for behavioural adaptation @ Meeting ASCENS 2011
Maude .:° ASCENS 2011
IMT Welcome Day 2011
A Graph Syntax for Processes and Services @ Workshop WS-FM 2009
An Algebra of Hierarchical Graphs
Ad

Recently uploaded (20)

PDF
Cosmology using numerical relativity - what hapenned before big bang?
PDF
Chapter 3 - Human Development Poweroint presentation
PDF
Science Form five needed shit SCIENEce so
PDF
Integrative Oncology: Merging Conventional and Alternative Approaches (www.k...
PPTX
congenital heart diseases of burao university.pptx
PPTX
Presentation1 INTRODUCTION TO ENZYMES.pptx
PPTX
SCIENCE 4 Q2W5 PPT.pptx Lesson About Plnts and animals and their habitat
PPTX
PMR- PPT.pptx for students and doctors tt
PPTX
limit test definition and all limit tests
PPTX
2currentelectricity1-201006102815 (1).pptx
PPTX
gene cloning powerpoint for general biology 2
PPTX
ELISA(Enzyme linked immunosorbent assay)
PPTX
Preformulation.pptx Preformulation studies-Including all parameter
PPT
THE CELL THEORY AND ITS FUNDAMENTALS AND USE
PDF
The Future of Telehealth: Engineering New Platforms for Care (www.kiu.ac.ug)
PPTX
Cells and Organs of the Immune System (Unit-2) - Majesh Sir.pptx
PPTX
TORCH INFECTIONS in pregnancy with toxoplasma
PPTX
HAEMATOLOGICAL DISEASES lack of red blood cells, which carry oxygen throughou...
PDF
Communicating Health Policies to Diverse Populations (www.kiu.ac.ug)
PDF
Unit 5 Preparations, Reactions, Properties and Isomersim of Organic Compounds...
Cosmology using numerical relativity - what hapenned before big bang?
Chapter 3 - Human Development Poweroint presentation
Science Form five needed shit SCIENEce so
Integrative Oncology: Merging Conventional and Alternative Approaches (www.k...
congenital heart diseases of burao university.pptx
Presentation1 INTRODUCTION TO ENZYMES.pptx
SCIENCE 4 Q2W5 PPT.pptx Lesson About Plnts and animals and their habitat
PMR- PPT.pptx for students and doctors tt
limit test definition and all limit tests
2currentelectricity1-201006102815 (1).pptx
gene cloning powerpoint for general biology 2
ELISA(Enzyme linked immunosorbent assay)
Preformulation.pptx Preformulation studies-Including all parameter
THE CELL THEORY AND ITS FUNDAMENTALS AND USE
The Future of Telehealth: Engineering New Platforms for Care (www.kiu.ac.ug)
Cells and Organs of the Immune System (Unit-2) - Majesh Sir.pptx
TORCH INFECTIONS in pregnancy with toxoplasma
HAEMATOLOGICAL DISEASES lack of red blood cells, which carry oxygen throughou...
Communicating Health Policies to Diverse Populations (www.kiu.ac.ug)
Unit 5 Preparations, Reactions, Properties and Isomersim of Organic Compounds...

Many-to-Many Information Flow Policies