International Conference on Networking (2008)
Apr. 13, 2008 to Apr. 18, 2008
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ICN.2008.87
Confidentiality is one of the most important topics in computer security research. In order to check and ensure confidentiality information flow models are widely used. These models support the specification of valid flows of information. Furthermore, they provide means to formally check whether a given system fulfills a certain security property within this model. In this paper, we propose an information flow model which accounts for different security concerns. In this model, each participant of the communication may have a different role and, thus, different clearance levels for each security concern. Moreover, we demonstrate the application of the maxplus Algebra to analyze the security of a given system and provide an algebraic check for the security property. This includes a method to derive assignments of security clearance levels that do not invalidate the system's security.
information flow, security, maxplus, lattice model
M. Werner, M. A. Jaeger and H. Parzyjegla, "An Application of the (max, +) Algebra to Information Flow Security," 2008 Seventh International Conference on Networking (ICN '08)(ICN), Cancun, 2008, pp. 262-266.