Extending noninterference properties to the timed world

Most previous work on information flow in process algebras has been based on untimed models of concurrency. It is obvious, however, that an observer might well use time to gain information about what a high-level user of the system is doing. We use the priority tock view (a discrete timed model) to extend several traditional untimed noninterference properties to the timed world. These are the determinism-based conditions of [14], [15] and [17], and Forster's local noninterference properties [6], [7].

[1]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[2]  A. W. Roscoe,et al.  The Timed Failures-Stability Model for CSP , 1999, Theor. Comput. Sci..

[3]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[4]  Ouaknine Joel,et al.  Discrete analysis of continuous behaviour in real-time concurrent systems , 2000 .

[5]  Roberto Gorrieri,et al.  An Information Flow Security Property for CCS , 1993 .

[6]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.

[7]  Bill Roscoe,et al.  The successes and failures of behavioural models , 2000 .

[8]  A. W. Roscoe CSP and determinism in security modelling , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[9]  Roberto Gorrieri,et al.  A Classification of Security Properties , 1993 .

[10]  Joël Ouaknine,et al.  Timed CSP = Closed Timed epsilon-automata , 2003, Nordic Journal of Computing.

[11]  Joël Ouaknine,et al.  On Timed Models and Full Abstraction , 2006, MFPS.

[12]  Lars Wulf,et al.  Interaction and security in distributed computing , 1997 .

[13]  A. W. Roscoe,et al.  Composing and decomposing systems under security properties , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[14]  Joël Ouaknine,et al.  Timed CSP = closed timed ε-automata , 2003 .

[15]  Roberto Gorrieri,et al.  Information flow analysis in a discrete-time process algebra , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.

[16]  B. Belkhouche,et al.  Acknowledgements We Would like to Thank , 1993 .

[17]  Roberto Gorrieri,et al.  Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..

[18]  Joël Ouaknine Discrete analysis of continuous behaviour in real-time concurrent systems , 2000 .

[19]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[20]  J. Todd Wittbold,et al.  Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.