2012
DOI: 10.1002/cpe.2807
|View full text |Cite
|
Sign up to set email alerts
|

Information flow control of component‐based distributed systems

Abstract: SUMMARYNoninterference is a strong security policy that enforces confidentiality and integrity. Many solutions are proposed in the state of the art for verifying this policy in programs, but few tools are proposed to implement it. In this paper, we define a high‐level model called Component Information Flow, and we develop the tools that simplify distributed secure system development and deployment.The developer focuses on developing the functional part of his or her system and defines his or her system securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…Component Information Flow [13] is a design framework for component-based system architectures where security constraints (labels) can be specified on communication interfaces. It provides tools for model validation and code generation.…”
Section: Related Workmentioning
confidence: 99%
“…Component Information Flow [13] is a design framework for component-based system architectures where security constraints (labels) can be specified on communication interfaces. It provides tools for model validation and code generation.…”
Section: Related Workmentioning
confidence: 99%
“…In our work, no language shift is required for common Java developers. Furthermore, our work is classified in component-based information flow security [7] [8]. We adopt the composition in IFC verification in our web environment since we split the IFC verification following the MVC layers.…”
Section: Related Workmentioning
confidence: 99%
“…The model in [14] offers functions to check intra-component information flows through the JIF language [35]. It also defines protocols to check inter-component information flows.…”
Section: Related Workmentioning
confidence: 99%
“…Models such as [12] belong to the first one, which fail to check information flows within a service and results in imprecise control. Models such as [14] belong to the second one. Although they are precise, they may induce large runtime overhead.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation