Information flow security, abstraction and composition
نویسندگان
چکیده
منابع مشابه
Information flow security, abstraction and composition
We present a framework that supports an incremental and modular development process of secure software systems. The framework unifies the treatment of secure information flow properties and their relationship to refinement of underspecification, translation from one level of granularity to another, and composition.
متن کاملSecurity Models and Information Flow
We develop a theory of information flow that differs from Nondeducibility’s, which we see is really a theory of information sharing. We use our theory to develop a flow-based security model, FM, and show that the proper treatment of security-relevant causal factors in such a framework is very tricky. Using FM as a standard for comparison, we examine Noninterference, Generalized Noninterference,...
متن کاملProbabilistic Information Flow Security
A formal model for description of probabilistic timing attacks is presented and studied. It is based on a probabilistic timed process algebra, on observations (mappings which make visible only a part of system behavior) and on an information flow. The resulting security properties are studied and compared with other security concepts.
متن کاملInfopipes—an Abstraction for Information Flow
Building Object-Oriented Distributed Systems has been facilitated by Remote Message Sending (RMS) systems like Java RMI and implementations of CORBA. However, RMS systems are designed to support request/response interactions. Streaming applications, in contrast, are characterized by high-bandwidth, long-duration communication with stringent performance requirements. Examples of streaming applic...
متن کاملUnwinding in Information Flow Security
We study information flow security properties which are persistent, in the sense that if a system is secure then all of its reachable states are secure too. We present a uniform characterization of these properties in terms of a general unwinding schema. This unwinding characterization allows us to prove several compositionality properties of the considered security classes. Moreover, we exploi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Information Security
سال: 2009
ISSN: 1751-8709,1751-8717
DOI: 10.1049/iet-ifs:20080069