Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
DOI: 10.1109/secpri.1997.601320
|View full text |Cite
|
Sign up to set email alerts
|

Secure software architectures

Abstract: The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which the various representations of the architecture of a software system are described formally and the desired security properties of the system are proven to hold at the architectural level. The main ideas are illustrated by means of the WOpen Distributed Transaction Processing reference architecture, which is formalized and extendedfo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(27 citation statements)
references
References 12 publications
0
27
0
Order By: Relevance
“…First, we wanted to determine whether implementation-level SDTP architectural descriptions could be derived for the three implementation approaches defined in our earlier paper [8] by the application of transformations that introduce only faithful interpretations. While we do not have a definitive answer to this question, our experience suggests that such a derivation would be difficult or impossible.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…First, we wanted to determine whether implementation-level SDTP architectural descriptions could be derived for the three implementation approaches defined in our earlier paper [8] by the application of transformations that introduce only faithful interpretations. While we do not have a definitive answer to this question, our experience suggests that such a derivation would be difficult or impossible.…”
Section: Discussionmentioning
confidence: 99%
“…3 A priori, it was not known what percentage of the design history encoded in the X/Open DTP hierarchy could be reused in the SDTP hierarchy. We therefore developed implementation-level descriptions of the three abstract architectures for SDTP that we have described in an earlier publication [8]. It turned out that over 90% of the design decisions made during the implementation of each of the three SDTP architectures could be based on decisions recorded in DTP hierarchy; conversely, every design decision in the DTP hierarchy was reused in the development of every one of the three SDTP hierarchies.…”
Section: Defining the Sdtp Hierarchymentioning
confidence: 99%
See 1 more Smart Citation
“…One product of that research is a dynamic architecture for secure distributed transaction processing (SDTP) [3,10]. SDTP was designed by writing a simple abstract description of the architecture, showing that the description guarantees the desired security properties, successively refining the abstract description until a directly implementable concrete description results, and showing that each refinement step preserves satisfaction of the security policy.…”
Section: Designing For Dependabilitymentioning
confidence: 99%
“…Examples of a component include: a single button in a graphical user interface, a small interest calculator, an interface to a database manager. Components can be deployed on di erent servers in a network and communicate with each other for needed services [10,3]. A component runs within a context called a container.…”
Section: Distributed Component Object Modelmentioning
confidence: 99%