skip to main content
article
Free Access

Exception-based information flow control in object-oriented systems

Published:01 November 1998Publication History
Skip Abstract Section

Abstract

We present an approach to control information flow in object-oriented systems. The decision of whether an information flow is permitted or denied depends on both the authorizations specified on the objects and the process by which information is obtained and transmitted. Depending on the specific computations, a process accessing sensitive information could still be allowed to release information to users who are not allowed to directly access it. Exceptions to the permissions and restrictions stated by the authorizations are specified by means of exceptions associated with methods. Two kinds of exceptions are considered: invoke exceptions, applicable during a mehtod execution and reply exceptions applicable to the information returned by a method. Information flowing from one object into another or returned to the user is subject to the different exceptions specified for the methods enforcing the transmission. We formally characterize information transmission and flow in a transaction and define the conditions for safe information flow. We define security specifications and characterize safe information flows. We propose an approach to control unsafe flows and present an algorithm to enforce it. We also illustrate an efficient implementation of our controls and present some experimental results evaluating its performance.

References

  1. ANDREWS, G. R. AND REITMAN, R. P. 1980. An axiomatic approach to information flow in programs. ACM Trans. Program. Lang. Syst. 2, 1, 56-76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BELL, D. E. AND LAPADULA, L.J. 1976. Secure computer systems: Unified exposition and multics interpretation. Tech Rep. ESD-TR-75-306. MITRE Corp., Bedford, MA.Google ScholarGoogle Scholar
  3. BINGHAM, H.W. 1974. Access controls in Burroughs large systems. Privacy and Security in Computer Systems, Tech. Rep. 404. National Bureau of Standards, Washington, DC.Google ScholarGoogle Scholar
  4. BOEBERT, W. E. AND FERGUSON, C. T. 1985. A partial solution to the discretionary Trojan horse problem. In Proceedings of the 8th National Conference on Computer Security. 141-144.Google ScholarGoogle Scholar
  5. CAREY, M., DEWITT, D., AND NAUGHTON, J. 1993. The 007 benchmark. In Proceedings of the 1993 SIGMOD Conference. ACM Press, New York, NY, 12-21. Google ScholarGoogle Scholar
  6. CASTANO, S., FUGINI, M. G., MARTELLA, G., AND SAMARATI, P. 1995. Database Security. ACM Press/Addison-Wesley Publ. Co., New York, NY. Google ScholarGoogle Scholar
  7. CROCKER, S. AND POZZO, M. 1989. A verification-based filter. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 319-324.Google ScholarGoogle Scholar
  8. DENNING, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2, 236 -243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. DENNING, D. E. 1982. Cryptography and Data Security. ACM Press/Addison-Wesley Publ. Co., New York, NY. Google ScholarGoogle Scholar
  10. GRAUBART, R. 1989. On the need for a third form of access control. In Proceedings of the 12th National Conference on Computer Security (Gaithersburg, MD). 296-303.Google ScholarGoogle Scholar
  11. INFORMIX SOFTWARE, INC., 1993. Informix-Online/Secure. Security Features User's Guide. Informix Software, Inc.Google ScholarGoogle Scholar
  12. JAJODIA, S. AND KOGAN, B. 1990. Integrating an object-oriented data model with multilevel security. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 76-84.Google ScholarGoogle Scholar
  13. KARGER, P.A. 1987. Limiting the damage potential of discretionary Trojan horses. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 32-37.Google ScholarGoogle Scholar
  14. KEMMERER, R.A. 1982. A practical approach to identifying storage and timing channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 66-71.Google ScholarGoogle Scholar
  15. KING, M. M. 1991. Identifying and controlling undesirable program behaviors. In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington, D. C., Oct.). 283-294.Google ScholarGoogle Scholar
  16. MCCOLLUM, C. J., MESSING, J. R., AND NOTARGIACOMO, L. 1990. Beyond the pale of MAC and DAC--Defining new forms of access control. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 190-200.Google ScholarGoogle Scholar
  17. MIZUNO, M. AND SCHMIDT, D. 1990. A security flow control algorithm and its denotational semantics correctness proof. Tech. Rep., Computing and Information Science Dept., Kansas State Univ.Google ScholarGoogle Scholar
  18. ORACLE CORP., 1996. Trusted Oracle Administrator's Guide. Oracle Corp.Google ScholarGoogle Scholar
  19. SAMARATI, P., BERTINO, E., CIAMPICHETTI, A., AND JAJODIA, S. 1997. Information flow control in object-oriented systems. IEEE Trans. Knowl. Data Eng. 9, 4, 524-538. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. STOUGHTON, A. 1981. Access flow: A protection model which integrates access control and information flow. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 9-18.Google ScholarGoogle Scholar
  21. SYBASE, INC., 1993. Sybase Secure SQL Server. Sybase, Inc.Google ScholarGoogle Scholar
  22. WALTER, K. G., OGDEN, W. F., ROUNDS, W. C., BRADSHAW, F. T., SUMAWAY, D. G., AND AMES, S. R. 1974. Primitive models for computer security. Tech. Rep. TR ESD-TR-4-117. Case Western Reserve Univ.Google ScholarGoogle Scholar
  23. WILKINSON, A. L., ANDERSON, D. H., CHANG, D. P., HIN, L. H., MAYO, A. J, VINEY, I. T., WILLIAMS, R., AND WRIGHT, W. 1981. A penetration analysis of a Burroughs large system. ACM SIGOPS Oper. Syst. Rev. 1, 15 (Jan.), 14-25. Google ScholarGoogle Scholar

Index Terms

  1. Exception-based information flow control in object-oriented systems

        Recommendations

        Reviews

        Christoph E. Bannwart

        In a database management system (DBMS), access control usually takes two forms: discretionary (DAC) and mandatory (MAC). DAC is supported in SQL through the GRANT command. In MAC, a security class is assigned to each database object and user. As Raghu Ramakrishnan has remarked, “The main drawback of mandatory access control schemes is their rigidity.…A satisfactory combination of discretionary and mandatory access controls is yet to be achieved” [1]. This situation is the starting point of the research and paper by Bertino et al. Their approach, which they call “flow control,” makes use of the fact that, in an object-oriented database management system (OODBMS), all information is accessed by procedures (methods). The authors propose to associate each procedure with a set of exceptions to the existing authorization schemes. In this way, they hope to provide the flexibility that is lacking in any combination of DAC and MAC. After an outline of their approach, the authors specify a language to express the exceptions and the exception conditions. Then they define “safe information flow” between objects and describe how unsafe flows could be controlled by message filtering. Other issues they deal with are the performance of flow control and the certification of exception and method specifications. The conclusion points to an important issue that may well decide whether the proposed approach will be practical for commercial systems: the administration of authorization and exceptions and the understanding of their interworking. In the meantime, this paper will form a good basis for an informed discussion of authorization in object-oriented systems.

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Information and System Security
          ACM Transactions on Information and System Security  Volume 1, Issue 1
          Nov. 1998
          132 pages
          ISSN:1094-9224
          EISSN:1557-7406
          DOI:10.1145/290163
          • Editor:
          • Ravi Sanhu
          Issue’s Table of Contents

          Copyright © 1998 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 1998
          Published in tissec Volume 1, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader