[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Enforcing Distributed Information Flow Policies Architecturally: The SAID Approach

  • Conference paper
Coordination Models and Languages (COORDINATION 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3454))

Included in the following conference series:

  • 306 Accesses

Abstract

Architectural security of a distributed system is best considered at design time rather than further down the software life cycle where it may become very expensive to make even minor modifications to the software architecture. In this paper we take Architectural Interaction Diagrams (AID) [9,8], an architecture description framework with an unique ability to encode communication efficiently and augment actions of AID components with security levels to produce SAID. This new architecture description language enables the designer to impose information flow restriction policies on system communications at design time which in turn allows a reduction of the information flow analysis problem for distributed systems to the simpler problem of information flow analysis of individual components of the distributed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Sun solaris documentation. Solaris X Windows Developers Guide: SUN Microsystems (1999)

    Google Scholar 

  2. Chang, J.-M., Maxemchuk, N.F.: Reliable broadcast protocols. ACM Trans. Comput. Syst. 2(3), 251–273 (1984)

    Article  Google Scholar 

  3. Hoare, C.A.R.: Communicating sequential processes (1985)

    Google Scholar 

  4. Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security 11(4), 615–676 (2003)

    Article  Google Scholar 

  5. Carriero, N., Gelertner, D.: Linda in context. Communications of the ACM 32(4), 445–458 (1989)

    Article  Google Scholar 

  6. Plotkin, G.D.: A structural approach to operational semantics. Technical Report DAIMI-FN-19, Computer Science Department, Aarhus University, Aarhus, Denmark (1981)

    Google Scholar 

  7. Allen, R., Garlan, D.: Formalizing architectural connection. In: 16th International Conference on Software Engineering (1994)

    Google Scholar 

  8. Ray, A.: Compositional modeling of interaction centric concurrent systems. Ph.D thesis, State University of New York at Stonybrook (2004)

    Google Scholar 

  9. Ray, A., Cleaveland, R.: Architectural interaction diagrams: Aids for system modeling. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 396–406 (2003)

    Google Scholar 

  10. Ray, A., Cleaveland, R.: Formal modeling of middleware-based distributed systems. In: Workshop on Formal Foundations of Embedded Software and Component-Based Architecture,Satellite workshop of the European Joint Symposia on Theory and Practice of Software, Barcelona, Spain, April 2004. To appear in Electronic Notes in Theoretical Computer Science (2004)

    Google Scholar 

  11. Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discrete-time process algebra. IEEE Computer Security Foundations Workshop, 170–184 (2000)

    Google Scholar 

  12. Milner, R. (ed.): A Calculus of Communication Systems. LNCS, vol. 92. Springer, Heidelberg (1980)

    MATH  Google Scholar 

  13. Sewell, Vitek: Secure composition of insecure components. In: PCSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1999)

    Google Scholar 

  14. Soley, R.: the OMG Staff Strategy Group. Model driven architecture

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ray, A. (2005). Enforcing Distributed Information Flow Policies Architecturally: The SAID Approach. In: Jacquet, JM., Picco, G.P. (eds) Coordination Models and Languages. COORDINATION 2005. Lecture Notes in Computer Science, vol 3454. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11417019_9

Download citation

  • DOI: https://doi.org/10.1007/11417019_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25630-4

  • Online ISBN: 978-3-540-32006-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics