Security correctness for secure nested transactions extended abstract

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Secure nested transactions have been introduced as a synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is to consider information flow control for certain classes of concurrent applications. This article describes a noninterference result for secure nested transactions, based on observational equivalence. A semantics for secure nested transactions is provided based on an extension of the pi-calculus with nested transactions, the calculus. A novelty of this semantics is a constrained labelled transition system, where local transition rules place logical constraints on the global state of the transactional context. This context is described by a notion of logs, an abstraction for factoring transactional state out of the usual description of concurrent processes. An advantage of this approach is that it allows the consideration of security properties such as noninterference independently of transactional properties such as serializability.

Original languageEnglish
Title of host publicationTrustworthy Global Computing - 8th International Symposium, TGC 2013, Revised Selected Papers
Pages64-79
Number of pages16
DOIs
StatePublished - 2014
Event8th International Symposium on Trustworthy Global Computing, TGC 2013 - Buenos Aires, Argentina
Duration: 30 Aug 201331 Aug 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8358 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Symposium on Trustworthy Global Computing, TGC 2013
Country/TerritoryArgentina
CityBuenos Aires
Period30/08/1331/08/13

Fingerprint

Dive into the research topics of 'Security correctness for secure nested transactions extended abstract'. Together they form a unique fingerprint.

Cite this