Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new approach for ensuring that security-critical software correctly enforces its information release policy. Our approach has two parts. First, an information release policy is specified as a security automaton written in a new language called AIR. Second, we enforce an AIR policy by translating it into an API for programs written in Lair, a core formalism for a functional programming language. Lair uses a novel combination of dependent, affine, and singleton types to ensure that the API is used correctly. As a consequence we can certify that programs written in Lair meet the requirements of the original AIR policy specification.
[ .pdf ]
@techreport{swamy08airTR, author = {Nikhil Swamy and Michael Hicks}, institution = {University of Maryland, Department of Computer Science}, number = {CS-TR-4906}, title = {Verified Enforcement of Automaton-based Information Release Policies}, mon = jun, year = 2008, note = {Full version of PLAS 08 paper} }
This file was generated by bibtex2html 1.99.