Entry Bertino:1998:EBI from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Bertino:1998:EBI,
  author =       "Elisa Bertino and Sabrina {De Capitani Di Vimercati}
                 and Elena Ferrari and Pierangela Samarati",
  title =        "Exception-based information flow control in
                 object-oriented systems",
  journal =      j-TISSEC,
  volume =       "1",
  number =       "1",
  pages =        "26--65",
  month =        nov,
  year =         "1998",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Jul 27 17:35:45 MDT 1999",
  bibsource =    "http://www.acm.org/tissec/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tissec/1998-1-1/p26-bertino/",
  abstract =     "We present an approach to control information flow in
                 object-oriented systems. The decision of whether an
                 information flow is permitted or denied depends on both
                 the authorizations specified on the objects and the
                 process by which information is obtained and
                 transmitted. Depending on the specific computations, a
                 process accessing sensitive information could still be
                 allowed to release information to users who are not
                 allowed to directly access it. Exceptions to the
                 permissions and restrictions stated by the
                 authorizations are specified by means of exceptions
                 associated with methods. Two kinds of exceptions are
                 considered: {\em invoke exceptions,\/} applicable
                 during a method execution and {\em reply exceptions\/}
                 applicable to the information returned by a method.
                 Information flowing from one object into another or
                 returned to the user is subject to the different
                 exceptions specified for the methods enforcing the
                 transmission. We formally characterize information
                 transmission and flow in a transaction and define the
                 conditions for safe information flow. We define
                 security specifications and characterize safe
                 information flows. We propose an approach to control
                 unsafe flows and present an algorithm to enforce it. We
                 also illustrate an efficient implementation of our
                 controls and present some experimental results
                 evaluating its performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "security",
  subject =      "{\bf H.2.7} Information Systems, DATABASE MANAGEMENT,
                 Database Administration, Security, integrity, and
                 protection. {\bf H.2.4} Information Systems, DATABASE
                 MANAGEMENT, Systems, Object-oriented databases.",
}

Related entries