Abstract
Architectural security of a distributed system is best considered at design time rather than further down the software life cycle where it may become very expensive to make even minor modifications to the software architecture. In this paper we take Architectural Interaction Diagrams (AID) [9,8], an architecture description framework with an unique ability to encode communication efficiently and augment actions of AID components with security levels to produce SAID. This new architecture description language enables the designer to impose information flow restriction policies on system communications at design time which in turn allows a reduction of the information flow analysis problem for distributed systems to the simpler problem of information flow analysis of individual components of the distributed system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sun solaris documentation. Solaris X Windows Developers Guide: SUN Microsystems (1999)
Chang, J.-M., Maxemchuk, N.F.: Reliable broadcast protocols. ACM Trans. Comput. Syst. 2(3), 251–273 (1984)
Hoare, C.A.R.: Communicating sequential processes (1985)
Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security 11(4), 615–676 (2003)
Carriero, N., Gelertner, D.: Linda in context. Communications of the ACM 32(4), 445–458 (1989)
Plotkin, G.D.: A structural approach to operational semantics. Technical Report DAIMI-FN-19, Computer Science Department, Aarhus University, Aarhus, Denmark (1981)
Allen, R., Garlan, D.: Formalizing architectural connection. In: 16th International Conference on Software Engineering (1994)
Ray, A.: Compositional modeling of interaction centric concurrent systems. Ph.D thesis, State University of New York at Stonybrook (2004)
Ray, A., Cleaveland, R.: Architectural interaction diagrams: Aids for system modeling. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 396–406 (2003)
Ray, A., Cleaveland, R.: Formal modeling of middleware-based distributed systems. In: Workshop on Formal Foundations of Embedded Software and Component-Based Architecture,Satellite workshop of the European Joint Symposia on Theory and Practice of Software, Barcelona, Spain, April 2004. To appear in Electronic Notes in Theoretical Computer Science (2004)
Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discrete-time process algebra. IEEE Computer Security Foundations Workshop, 170–184 (2000)
Milner, R. (ed.): A Calculus of Communication Systems. LNCS, vol. 92. Springer, Heidelberg (1980)
Sewell, Vitek: Secure composition of insecure components. In: PCSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1999)
Soley, R.: the OMG Staff Strategy Group. Model driven architecture
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ray, A. (2005). Enforcing Distributed Information Flow Policies Architecturally: The SAID Approach. In: Jacquet, JM., Picco, G.P. (eds) Coordination Models and Languages. COORDINATION 2005. Lecture Notes in Computer Science, vol 3454. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11417019_9
Download citation
DOI: https://doi.org/10.1007/11417019_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25630-4
Online ISBN: 978-3-540-32006-7
eBook Packages: Computer ScienceComputer Science (R0)