Publication:
Using Architecture to Reason about Information Security

Thumbnail Image

Date

2015

Published Version

Journal Title

Journal ISSN

Volume Title

Publisher

Association for Computing Machinery (ACM)
The Harvard community has made this article openly available. Please share how this access benefits you.

Research Projects

Organizational Units

Journal Issue

Citation

Chong, Stephen, and Ron Van Der Meyden. 2015. “Using Architecture to Reason About Information Security.” ACM Transactions on Information and System Security 18 (2) (December 9): 1–30. doi:10.1145/2829949.

Research Data

Abstract

We demonstrate, by a number of examples, that information-flow security properties can be proved from abstract architectural descriptions, that describe only the causal structure of a system and local properties of trusted components. We specify these architectural descriptions of systems by generalizing intransitive noninterference policies to admit the ability to filter information passed between communicating domains. A notion of refinement of such system architectures is developed that supports top-down development of architectural specifications and proofs by abstraction of information security properties. We also show that, in a concrete setting where the causal structure is enforced by access control, a static check of the access control setting plus local verification of the trusted components is sufficient to prove that a generalized intransitive noninterference policy is satisfied.

Description

Other Available Sources

Keywords

Terms of Use

This article is made available under the terms and conditions applicable to Open Access Policy Articles (OAP), as set forth at Terms of Service

Endorsement

Review

Supplemented By

Referenced By

Related Stories