2016 IEEE 29th Computer Security Foundations Symposium (CSF) 2016
DOI: 10.1109/csf.2016.25
|View full text |Cite
|
Sign up to set email alerts
|

Non-interference with What-Declassification in Component-Based Systems

Abstract: Abstract-Component-based design is a method for modular design of systems. The structure of component-based systems follows specific rules and single components make assumptions on the environment that they run in. In this paper, we provide a noninterference property for component-based systems that allows for a precise specification of what-declassification of information and takes assumptions on the environment into consideration in order to allow a modular, precise and re-usable information-flow analysis. F… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…We believe the future of information flow security verification will see an increased cooperation between fully automatic tools and proof assistants; the former being employed for wide-covering lightweight properties and the latter being employed more sparingly, for heavier properties of clearly isolated relatively small cores of systems. Compositionality results for information flow security [6,28,30,48,59] will play a key role in achieving such a cooperation on a well-understood semantic basis.…”
Section: Automatic Analysis Of Information Flowmentioning
confidence: 99%
“…We believe the future of information flow security verification will see an increased cooperation between fully automatic tools and proof assistants; the former being employed for wide-covering lightweight properties and the latter being employed more sparingly, for heavier properties of clearly isolated relatively small cores of systems. Compositionality results for information flow security [6,28,30,48,59] will play a key role in achieving such a cooperation on a well-understood semantic basis.…”
Section: Automatic Analysis Of Information Flowmentioning
confidence: 99%
“…In [48], a security property and a security type system are developed for a concurrent language with asynchronous message-passing communication, with support for compositional reasoning under arbitrary environments of systems. In [19], compositional reasoning techniques are developed for the information-flow security of component-based systems where the components communicate via synchronous message-passing. The potential environments of each component is explicitly considered in secure composition.…”
Section: Information-flow Security For Message-passing Systemsmentioning
confidence: 99%
“…In the remainder of this work we take the formalization of components from Greiner and Grahl [1] and reuse their notation for better comparability of further results in this paper.…”
Section: Components and Component Fault Treesmentioning
confidence: 99%