Cut me some security

Computer security is currently fraught with fine-grained access control policies, in operating systems, applications and even programming languages. All this policy configuration means that too many decisions are left to administrators, developers and even users to some extent and as a result we do not get any comprehensive security guarantees. In this position paper, we take a stand for the idea that less policy is better and propose that limiting the choices given to parties along the development and deployment process leads to a more secure system. We argue that other systems processes like scheduling and memory management achieve their goals with minimal user input and access control configuration should also follow suit. We then suggest a technique to automate access control configuration using graph-cuts and show that this gets us closer to achieving our goal.

[1]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[2]  Paul C. van Oorschot,et al.  The developer is the enemy , 2009, NSPW '08.

[3]  Hong Chen,et al.  Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems , 2009, NDSS.

[4]  James P Anderson Computer Security Technology Planning Study. Volume 2 , 1972 .

[5]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[6]  Daniel F. Sterne,et al.  Confining Root Programs with Domain and Type Enforcement , 1996, USENIX Security Symposium.

[7]  Somesh Jha,et al.  Automating Security Mediation Placement , 2010, ESOP.

[8]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[9]  Xi Wang,et al.  Improving application security with data flow assertions , 2009, SOSP '09.

[10]  Andrew C. Myers,et al.  Jif: java information flow , 1999 .

[11]  Michael M. Swift,et al.  Improving the granularity of access control for Windows 2000 , 2002, TSEC.

[12]  Eddie Kohler,et al.  Making information flow explicit in HiStar , 2006, OSDI '06.

[13]  Eamon F. Walsh,et al.  Application of the Flask Architecture to the X Window System Server , 2007 .

[14]  Li Gong,et al.  Inside Java 2 Platform Security: Architecture, API Design, and Implementation , 1999 .

[15]  Christopher Krügel,et al.  Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[16]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[17]  Eddie Kohler,et al.  Information flow control for standard OS abstractions , 2007, SOSP.

[18]  Andrew C. Myers,et al.  A decentralized model for information flow control , 1997, SOSP.

[19]  Vladimir Gurvich,et al.  Enumerating disjunctions and conjunctions of paths and cuts in reliability theory , 2007, Discret. Appl. Math..