Preventing unauthorized data flows

dc.citation.epage62en_US
dc.citation.spage41en_US
dc.citation.volumeNumber10359en_US
dc.contributor.authorUzun, Emreen_US
dc.contributor.authorParlato, G.en_US
dc.contributor.authorAtluri, V.en_US
dc.contributor.authorFerrara, A. L.en_US
dc.contributor.authorVaidya, J.en_US
dc.contributor.authorSural, S.en_US
dc.contributor.authorLorenzi, D.en_US
dc.coverage.spatialPhiladelphia, PA, USAen_US
dc.date.accessioned2018-04-12T11:46:48Z
dc.date.available2018-04-12T11:46:48Z
dc.date.issued2017en_US
dc.departmentDepartment of Computer Technology and Information Systemsen_US
dc.departmentDepartment of Computer Engineeringen_US
dc.descriptionConference name: 31st Annual IFIP WG 11.3 Conference, DBSec 2017en_US
dc.descriptionDate of Conference: July 19-21, 2017en_US
dc.description.abstractTrojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one must exist. Thus, to eliminate unauthorized flows, it is sufficient to remove all one-step flows, thereby avoiding the need for expensive transitive closure computations. This new insight allows us to develop an efficient methodology to identify and prevent all unauthorized flows leading to confidentiality and integrity violations. We develop separate solutions for two different environments that occur in real life, and experimentally validate the efficiency and restrictiveness of the proposed approaches using real data sets. © IFIP International Federation for Information Processing 2017.en_US
dc.identifier.doi10.1007/978-3-319-61176-1_3en_US
dc.identifier.doi10.1007/978-3-319-61176-1en_US
dc.identifier.isbn9783319611754en_US
dc.identifier.issn0302-9743en_US
dc.identifier.urihttp://hdl.handle.net/11693/37651en_US
dc.language.isoEnglishen_US
dc.publisherSpringer, Chamen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-319-61176-1_3en_US
dc.relation.isversionofhttps://doi.org/10.1007/978-3-319-61176-1en_US
dc.source.titleData and Applications Security and Privacy XXXIen_US
dc.subjectAccess controlen_US
dc.subjectData transferen_US
dc.subjectMalwareen_US
dc.subjectAnalysis techniquesen_US
dc.subjectData flowen_US
dc.subjectKeep track ofen_US
dc.subjectReal data setsen_US
dc.subjectStep flowen_US
dc.subjectTransitive closure computationsen_US
dc.subjectTrojan Horse attacksen_US
dc.subjectData privacyen_US
dc.titlePreventing unauthorized data flowsen_US
dc.typeConference Paperen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Preventing unauthorized data flows.pdf
Size:
411.74 KB
Format:
Adobe Portable Document Format
Description:
Full Printable Version