Security correctness for secure nested transactions extended abstract

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure nested transactions have been introduced as a synthesis of two long-standing lines of research in computer security: security correctness for multilevel databases, and language-based security. The motivation is to consider information flow control for certain classes of concurrent applications. This article describes a noninterference result for secure nested transactions, based on observational equivalence. A semantics for secure nested transactions is provided based on an extension of the pi-calculus with nested transactions, the calculus. A novelty of this semantics is a constrained labelled transition system, where local transition rules place logical constraints on the global state of the transactional context. This context is described by a notion of logs, an abstraction for factoring transactional state out of the usual description of concurrent processes. An advantage of this approach is that it allows the consideration of security properties such as noninterference independently of transactional properties such as serializability. © Springer International Publishing Switzerland 2014.

Cite

CITATION STYLE

APA

Duggan, D., & Wu, Y. (2014). Security correctness for secure nested transactions extended abstract. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8358 LNCS, pp. 64–79). Springer Verlag. https://doi.org/10.1007/978-3-319-05119-2_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free