Confidentiality of Interactions in Concurrent Object-Oriented Systems

被引:3
作者
Owe, Olaf [1 ]
Ramezanifarkhani, Toktam [1 ]
机构
[1] Univ Oslo, Dept Informat, Oslo, Norway
来源
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY | 2017年 / 10436卷
关键词
Concurrent objects; Asynchronous methods; Communication patterns; Information flow; Secrecy; Confidentiality; Distributed systems; Inter-object leakage; MODEL;
D O I
10.1007/978-3-319-67816-0_2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider a general concurrency model for distributed systems, based on concurrent objects communicating by asynchronous methods. This model is suitable for modeling of modern service-oriented systems, and gives rise to efficient interaction avoiding active waiting and low-level synchronization primitives such as explicit signaling and lock operations. This concurrency model has a simple semantics and allows us to focus on information flow at a high level of abstraction, and allows realistic analysis by avoiding unnecessary restrictions on information flow between confidential and non-confidential data. We formalize our approach by introducing a high-level language for this concurrency model, and we provide a secrecy-type system to capture inter-object communication. We prove soundness based on an operational semantics, which includes runtime secrecy levels.
引用
收藏
页码:19 / 34
页数:16
相关论文
共 19 条
[1]  
Askarov A, 2008, LECT NOTES COMPUT SC, V5283, P333
[2]   Stack-based access control and secure information flow [J].
Banerjee, A ;
Naumann, DA .
JOURNAL OF FUNCTIONAL PROGRAMMING, 2005, 15 :131-177
[3]  
Barthe G, 2007, LECT NOTES COMPUT SC, V4734, P2
[4]   Noninterference Through Secure Multi-Execution [J].
Devriese, Dominique ;
Piessens, Frank .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :109-124
[5]   Observable behavior of distributed systems: Component reasoning for concurrent objects [J].
Din, Crystal Chang ;
Dovland, Johan ;
Johnsen, Einar Broch ;
Owe, Olaf .
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2012, 81 (03) :227-256
[6]  
Erlingsson U., 2004, THESIS
[7]  
Goguen J. A., 1984, Proceedings of the 1984 Symposium on Security and Privacy, P75
[8]  
Heintze N., 1998, Conference Record of POPL '98: 25th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P365, DOI 10.1145/268946.268976
[9]  
Hodges S. J., 1996, Object orientation with parallelism and persistence, P1
[10]  
Johnsen E.B., 2011, Lecture Notes in Computer Science, V6957, P142, DOI [DOI 10.1007/978-3-642-25271-6, 10.1007/978- 3- 642-25271-6 8]