Cornell University
Library
Cornell UniversityLibrary

eCommons

Help
Log In(current)
  1. Home
  2. Cornell Computing and Information Science
  3. Computer Science
  4. Computer Science Technical Reports
  5. Flow-Limited Authorization

Flow-Limited Authorization

File(s)
Arden_tr.pdf (434.36 KB)
Flow-Limited Authorization: Technical Report
flam-proof.tar.gz (45.37 KB)
Permanent Link(s)
https://hdl.handle.net/1813/40138
Collections
Computer Science Technical Reports
Author
Arden, Owen
Liu, Jed
Myers, Andrew
Abstract

Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can be subverted by information flows that leak information or that influence the delegation of authority among principals. We argue that interactions between information flow and authorization create security vulnerabilities that have not been fully identified or addressed in prior work. We explore how the security of decentralized information flow control (DIFC) is affected by three aspects of its underlying authorization mechanism: first, delegation of authority between principals; second, revocation of previously delegated authority; third, information flows created by the authorization mechanisms themselves. It is no surprise that revocation poses challenges, but we show that even delegation is problematic because it enables unauthorized downgrading. Our solution is a new security model, the Flow-Limited Authorization Model (FLAM), which offers a new, integrated approach to authorization and information flow control. FLAM ensures robust authorization, a novel security condition for authorization queries that ensures attackers cannot influence authorization decisions or learn confidential trust relationships. We discuss our prototype implementation and its algorithm for proof search.

Description
Content file updated at author's request on 2015-06-04.
Sponsorship
NDSEG Fellowship
Date Issued
2015-05-08
Keywords
information flow control
•
authorization logic
•
security
•
access control
•
distributed computing
Type
technical report

Site Statistics | Help

About eCommons | Policies | Terms of use | Contact Us

copyright © 2002-2026 Cornell University Library | Privacy | Web Accessibility Assistance