Model-Driven Information Flow Security for Component-Based Systems

被引:0
作者
Ben Said, Najah [1 ]
Abdellatif, Takoua [2 ]
Bensalem, Saddek [1 ]
Bozga, Marius [1 ]
机构
[1] UJF Grenoble 1, CNRS, VERIMAG UMR 5104, F-38041 Grenoble, France
[2] Sousse Univ, ESSTHS, Hammam Sousse, Tunisia
来源
FROM PROGRAMS TO SYSTEMS: THE SYSTEMS PERSPECTIVE IN COMPUTING | 2014年 / 8415卷
关键词
component-based systems; information flow security; non-interference; unwinding conditions; automated verification;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes a formal framework for studying information flow security in component-based systems. The security policy is defined and verified from the early steps of the system design. Two kinds of non-interference properties are formally introduced and for both of them, sufficient conditions that ensures and simplifies the automated verification are proposed. The verification is compositional, first locally, by checking the behavior of every atomic component and then globally, by checking the inter-components communication and coordination. The potential benefits are illustrated on a concrete case study about constructing secure heterogeneous distributed systems.
引用
收藏
页码:1 / +
页数:5
相关论文
共 31 条
  • [1] Abdellatif Takoua., 2011, P 14 INT ACM SIGSOFT, P73, DOI DOI 10.1145/2000229
  • [2] Accorsi R., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P692, DOI 10.1109/ARES.2011.108
  • [3] Accorsi R, 2012, LECT NOTES COMPUT SC, V7481, P172, DOI 10.1007/978-3-642-32885-5_13
  • [4] [Anonymous], 2007, ACM SIGOPS OPERATING
  • [5] Bartolini Cesare, 2008, Architecting Dependable Systems V, P298, DOI 10.1007/978-3-540-85571-2_13
  • [6] Model Driven Security: From UML models to access control infrastructures
    Basin, D
    Doser, J
    Lodderstedt, T
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2006, 15 (01) : 39 - 91
  • [7] Basu A, 2006, I C SOFTW ENG FORM M, P3
  • [8] Rigorous Component-Based System Design Using the BIP Framework
    Basu, Ananda
    Bensalem, Saddek
    Bozga, Marius
    Combaz, Jacques
    Jaber, Mohamad
    Thanh-Hung Nguyen
    Sifakis, Joseph
    [J]. IEEE SOFTWARE, 2011, 28 (03) : 41 - 48
  • [9] Bell E.D., 1976, SECURE COMPUTER SYST
  • [10] CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW
    DENNING, DE
    DENNING, PJ
    [J]. COMMUNICATIONS OF THE ACM, 1977, 20 (07) : 504 - 513