Publication: Using Architecture to Reason about Information Security
Open/View Files
Date
2015
Published Version
Journal Title
Journal ISSN
Volume Title
Publisher
Association for Computing Machinery (ACM)
The Harvard community has made this article openly available. Please share how this access benefits you.
Citation
Chong, Stephen, and Ron Van Der Meyden. 2015. “Using Architecture to Reason About Information Security.” ACM Transactions on Information and System Security 18 (2) (December 9): 1–30. doi:10.1145/2829949.
Research Data
Abstract
We demonstrate, by a number of examples, that information-flow security properties can be proved from abstract architectural descriptions, that describe only the causal structure of a system and local properties of trusted components. We specify these architectural descriptions of systems by generalizing intransitive noninterference policies to admit the ability to filter information passed between communicating domains. A notion of refinement of such system architectures is developed that supports top-down development of architectural specifications and proofs by abstraction of information security properties. We also show that, in a concrete setting where the causal structure is enforced by access control, a static check of the access control setting plus local verification of the trusted components is sufficient to prove that a generalized intransitive noninterference policy is satisfied.
Description
Other Available Sources
Keywords
Terms of Use
This article is made available under the terms and conditions applicable to Open Access Policy Articles (OAP), as set forth at Terms of Service