TY - GEN
T1 - Security correctness for secure nested transactions extended abstract
AU - Duggan, Dominic
AU - Wu, Ye
PY - 2014
Y1 - 2014
N2 - Secure nested transactions have been introduced as a synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is to consider information flow control for certain classes of concurrent applications. This article describes a noninterference result for secure nested transactions, based on observational equivalence. A semantics for secure nested transactions is provided based on an extension of the pi-calculus with nested transactions, the calculus. A novelty of this semantics is a constrained labelled transition system, where local transition rules place logical constraints on the global state of the transactional context. This context is described by a notion of logs, an abstraction for factoring transactional state out of the usual description of concurrent processes. An advantage of this approach is that it allows the consideration of security properties such as noninterference independently of transactional properties such as serializability.
AB - Secure nested transactions have been introduced as a synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is to consider information flow control for certain classes of concurrent applications. This article describes a noninterference result for secure nested transactions, based on observational equivalence. A semantics for secure nested transactions is provided based on an extension of the pi-calculus with nested transactions, the calculus. A novelty of this semantics is a constrained labelled transition system, where local transition rules place logical constraints on the global state of the transactional context. This context is described by a notion of logs, an abstraction for factoring transactional state out of the usual description of concurrent processes. An advantage of this approach is that it allows the consideration of security properties such as noninterference independently of transactional properties such as serializability.
UR - http://www.scopus.com/inward/record.url?scp=84901293778&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84901293778&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-05119-2_5
DO - 10.1007/978-3-319-05119-2_5
M3 - Conference contribution
AN - SCOPUS:84901293778
SN - 9783319051185
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 64
EP - 79
BT - Trustworthy Global Computing - 8th International Symposium, TGC 2013, Revised Selected Papers
T2 - 8th International Symposium on Trustworthy Global Computing, TGC 2013
Y2 - 30 August 2013 through 31 August 2013
ER -