Information Flow Security for Asynchronous, Distributed, and Mobile Applications

作者: Felipe Luna del Aguila

DOI:

关键词:

摘要: The objective for this work is to propose a security solution regulate information flows, specifically through an access and flow control mechanism, targeted distributed applications using active objects with asynchronous communications. It includes policy the mechanism that will enforce rules present in such policies. Data confidentiality secure flows provided dynamic checks While are generally verified statically, our attention focused on verifications. To achieve it, proposed model has discretionary rules, because these by nature dynamically enforceable, it possible take advantage of carry out at same time all mandatory checks. As another approach, do not require modify compilers, alter programming language, modifications existing source codes, provide flexibility run-time. Thus, fit well middleware layer which, non-intrusive manner, provides ensures services upper-level applications. underlying based objects, communications, data-flow synchronizations.

参考文章(55)
R. Segala, R. Gorrieri, Riccardo Focardi, A New Definition of Multilevel Security workshop on information technologies and systems. ,(2000)
Ravi S. Sandhu, Sushil Jajodia, Boris Kogan, A Multilevel Secure Object- Oriented Data Model ,(2006)
John Hale, Mauricio Papa, Sujeet Shenoi, Programmable Security for Object-Oriented Systems Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects. pp. 109- 123 ,(1998) , 10.1007/978-0-387-35564-1_7
Isabelle Attali, Denis Caromel, Arnaud Contes, Hierarchical and Declarative Security for Grid Applications ieee international conference on high performance computing, data, and analytics. pp. 363- 372 ,(2003) , 10.1007/978-3-540-24596-4_39
Jan Vitek, Giuseppe Castagna, Seal: A Framework for Secure Mobile Computations Lecture Notes in Computer Science. pp. 47- 77 ,(1998) , 10.1007/3-540-47959-7_3
P. Herrmann, Information flow analysis of component-structured applications annual computer security applications conference. pp. 45- 54 ,(2001) , 10.1109/ACSAC.2001.991520
Luca Cardelli, Martin Abadi, A Theory of Objects ,(1996)
Ian Foster, Nicholas T. Karonis, Carl Kesselman, Steven Tuecke, Managing security in high-performance distributed computations Cluster Computing. ,vol. 1, pp. 95- 107 ,(1998) , 10.1023/A:1019021129146
Agostino Cortesi, Riccardo Focardi, Information Flow Security in Mobile Ambients Electronic Notes in Theoretical Computer Science. ,vol. 54, pp. 58- 68 ,(2001) , 10.1016/S1571-0661(04)00235-X
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa, Reasoning about Security in Mobile Ambients international conference on concurrency theory. ,vol. 2154, pp. 102- 120 ,(2001) , 10.1007/3-540-44685-0_8