Verification of Information Flow and Access Control Policies With Dependent Types

The authors present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. They show that a number of security policies which have been formalized separately in the literature can all be expressed in RHTT using only standard type-theoretic constructions such as monads, higher-order functions, abstract types, abstract predicates, and modules. Example security policies include conditional declassification, information erasure, and state-dependent information flow and access control. RHTT can reason about such policies in the presence of dynamic memory allocation, de-allocation, pointer aliasing and arithmetic.

Provided by: Carnegie Mellon University Topic: Security Date Added: Feb 2011 Format: PDF

Find By Topic