Proceedings of the 14th International ACM Sigsoft Symposium on Component Based Software Engineering 2011
DOI: 10.1145/2000229.2000241
|View full text |Cite
|
Sign up to set email alerts
|

Automating information flow control in component-based distributed systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Information flow analysis at code level. Abdellatif et al [29] present an approach accompanied by a toolkit to automate information flow control in component-based systems. Their approach requires developers to specify the security properties with a configuration file, which in turn is used to validate the system for potential data leaks, before the security code is generated.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Information flow analysis at code level. Abdellatif et al [29] present an approach accompanied by a toolkit to automate information flow control in component-based systems. Their approach requires developers to specify the security properties with a configuration file, which in turn is used to validate the system for potential data leaks, before the security code is generated.…”
Section: Related Workmentioning
confidence: 99%
“…Yet, our work is unique with respect to label propagation and label specification for system components. In addition, our work defines attacker zones as part of a global security policy, while Abdellatif et al [29] do not model the attacker explicitly.…”
Section: Related Workmentioning
confidence: 99%
“…In [18], a security configuration synthesis is provided but the adopted model does not deal with declassification and adaptation. Similarly, in [19], information flow security is applied to componentbased systems. Nevertheless, component code is required for label propagation, no formal model is provided and adaptation is not considered.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, our work is related to information flow security in component-based systems. In contrast to [23] where authors verify security in a component-based model by annotating the system ADL (Architecture Description Language) and tracking information flow at intra-and inter-components separately, this work provides a sound model with formal proofs guaranteeing system non-interference. Besides, and compared to our previous work [6] where we adopted a more general component-based model to build secure distributed systems, here we propose a simpler message-based send-receive model suitable to model applications with web-style primitives and communications like BPEL-based composed WS and we propose not only a security verification but also a practical solution for security configuration synthesis.…”
Section: Related Workmentioning
confidence: 99%