Language-based access control approach for component-based software applications
Language-based access control approach for component-based software applications
- Author(s): R. Su ; J.J. Lukkien ; M.R.V. Chaudron
- DOI: 10.1049/iet-sen:20070026
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): R. Su 1 ; J.J. Lukkien 1 ; M.R.V. Chaudron 1
-
-
View affiliations
-
Affiliations:
1: System Architecture and Networking Group (SAN), Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands
-
Affiliations:
1: System Architecture and Networking Group (SAN), Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands
- Source:
Volume 1, Issue 5,
October 2007,
p.
206 – 216
DOI: 10.1049/iet-sen:20070026 , Print ISSN 1751-8806, Online ISSN 1751-8814
- « Previous Article
- Table of contents
- Next Article »
Security in component-based software applications is studied by looking at information leakage from one component to another through operation calls. Components and security specifications about confidentiality as regular languages are modelled. Then a systematic way is provided to synthesise an access control mechanism, which not only guarantees all specifications to be obeyed, but also allows each user to attain maximum permissive behaviours.
Inspec keywords: access control; object-oriented programming
Other keywords: component-based software applications; security specification; access control mechanism; language-based access control; maximum permissive behaviours; information leakage
Subjects: Object-oriented programming; Computer installation management
References
-
-
1)
- G.J. Ahn , R. Sandhu . Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. , 4 , 207 - 226
-
2)
- D. Spinellis , D. Gritzalis . Panoptis: intrusion detection using a domain-specific language. J. Comput. Security , 159 - 176
-
3)
- Robocop: robust open component-based software architecture: URL http:\\www.hitech-projects.com\euprojects\robocop\deliverables.htm.
-
4)
- P. Inverardi , L. Mostarda . (2005) A distributed intrusion detection approach for security software architecture, Lecture Notes in Computer Science 3527.
-
5)
- W.M. Wonham , P.J. Ramadge . On the supremal controllable sublanguage and a given language. SIAM J Control Optim. , 3 , 637 - 659
-
6)
- M. Tivoli , M. Autili . SYNTHESIS, a tool for synthesizing correct and protocol-enhanced adaptors. RSTI L'Objet J. , 1 , 77 - 103
-
7)
- E.M. Clarke , O. Grumberg . (1999) Model checking.
-
8)
- B. Lampson , M. Abadi , M. Burrows , E. Wobber . Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst. (TOCS) , 4 , 265 - 310
-
9)
- S.T. Eckmann , G. Vigna , R.A. Kemmerer . STATL: an attack language for state-based intrusion detection. J. Comput. Security , 71 - 103
-
10)
- P. Inverardi , M. Tivoli . (2003) Software architecture for correct components assembly, in Formal Methods for the Design of Computer, Communication and Software Systems: Software Architecture.
-
11)
- Banerjee, A., Naumann, D.A.: `History-based access control and secure information flow', In Proc. Workshop on Construction and Analysis of Safe, Secure and Interoperable Smart Cards (CASSIS), 8–11 March 2005, Nice, France, p. 27–48.
-
12)
- Li, H., Zhang, X., Wu, H., Qu, Y.: `Design and application of rule based access control policies', Semantic Web and Policy Workshop, 4th Int. Semantic Web Conf., 7 November 2005, Galway, Ireland.
-
13)
- Edjlali, G., Acharya, A., Chaudhary, V.: `History-based access control for mobile code', 5thACM Conf. Comput. Communications Security, 1998, San Francisco, CA, USA, p. 38–48.
-
14)
- E.M. Clarke , E.A. Emerson , A.P. Sistla . Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. , 2 , 244 - 263
-
15)
- W.M. Wonham . (2004) Supervisory Control of Discrete-Event Systems.
-
16)
- R.S. Sandhu . Lattice-based access control models. IEEE Comput. , 11 , 9 - 19
-
17)
- D.F. Ferraiolo , D.R. Kuhn , R. Chandramouli . (2003) Role based access control.
-
18)
- Gordon, A.D., Jeffrey, A.: `Types and effects for asymmetric cryptographic protocols', IEEE Computer Security Foundations Workshop (CSFW), June 2002.
-
19)
- D.E. Denning . A lattice model of secure information flow. Comm. ACM , 5 , 236 - 243
-
20)
- Didriksen, T.: `Rule based database access control—a practical approach', Proc. 2nd ACM Workshop on Role-based access control, 1997, Fairfax, Virginia, US, p. 143–151.
-
21)
- D. Yellin , R. Strom . Protocol specifications and component adaptors. ACM Trans. Program. Languages Syst. , 2 , 292 - 333
-
22)
- F.B. Schneider . Enforced security policies. ACM Trans. Inf. Syst. Security , 1 , 30 - 50
-
23)
- R.S. Sandhu , E.J. Coyne , H.L. Feinstein , C.E. Youman . Role-based access control models. IEEE Comput. , 2 , 38 - 47
-
24)
- B.W. Lampson . Protection. ACM SIGOPS Operating Syst. Rev. , 1 , 18 - 24
-
25)
- X. Zhang , F. Parisi-Presicce , R. Sandhu , J. Park . Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. , 4 , 351 - 387
-
26)
- Bugliesi, M., Colazzo, D., Crafa, S.: `Type based discretionary access control', Fifteenth Int. Conf. Concurrency Theory (CONCUR 2004), 31 August–3 September 2004, London, England.
-
27)
- H. Mantel . (2001) Information flow control and applications – bridging a gap.
-
28)
- A.C. Myers , B. Liskov . Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Method. , 4 , 410 - 442
-
29)
- Kupferman, O., Vardi, M.Y.: `Module checking revisited', Proc. 9th Int. Conf. Computer Aided Verification LNCS 1254, 1997, p. 36–47.
-
30)
- Public deliverables of the Space4U project: URL http:\\www.hitech-projects.com\euprojects\space4u\deliverables.htm.
-
1)

Related content
