MILS-based information flow control in the avionic domain: A case study on compositional architecture and verification

Author(s):  
K. Muller ◽  
M. Paulitsch ◽  
R. Schwarz ◽  
S. Tverdyschev ◽  
H. Blasum
Author(s):  
Saadia Kedjar ◽  
Abdelkamel Tari ◽  
Peter Bertok

With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the application level focus on access control which cannot alone ensure the confidentiality and integrity of information. The solution proposed in this paper consists on a hybrid model that combines access control (AC) and information flow control (IFC). The AC mechanism uses the concept of roles and attributes to control user access to web services' methods. The IFC mechanism uses labels to control how the roles access to the system's objects and verify the information flows between them to ensure the information confidentiality and integrity. This manuscript describes the model, gives the demonstration of the IFC model safety, presents the modeling and implementation of the model and a case study.


Author(s):  
Saadia Kedjar ◽  
Abdelkamel Tari ◽  
Peter Bertok

With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the application level focus on access control which cannot alone ensure the confidentiality and integrity of information. The solution proposed in this paper consists on a hybrid model that combines access control (AC) and information flow control (IFC). The AC mechanism uses the concept of roles and attributes to control user access to web services' methods. The IFC mechanism uses labels to control how the roles access to the system's objects and verify the information flows between them to ensure the information confidentiality and integrity. This manuscript describes the model, gives the demonstration of the IFC model safety, presents the modeling and implementation of the model and a case study.


2015 ◽  
Vol 50 (9) ◽  
pp. 289-301 ◽  
Author(s):  
Pablo Buiras ◽  
Dimitrios Vytiniotis ◽  
Alejandro Russo

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 15156-15169
Author(s):  
Zhao Zhang ◽  
Zhi Yang ◽  
Xuehui Du ◽  
Wenfa Li ◽  
Xingyuan Chen ◽  
...  

1998 ◽  
Vol 1 (1) ◽  
pp. 26-65 ◽  
Author(s):  
Elisa Bertino ◽  
Sabrina De Capitani Di Vimercati ◽  
Elena Ferrari ◽  
Pierangela Samarati

1997 ◽  
Vol 9 (4) ◽  
pp. 524-538 ◽  
Author(s):  
P. Samarati ◽  
E. Bertino ◽  
A. Ciampichetti ◽  
S. Jajodia

Author(s):  
Shigenari Nakamura ◽  
Dilewaer Doulikun ◽  
Ailixier Aikebaier ◽  
Tomoya Enokido ◽  
Makoto Takizawa

Sign in / Sign up

Export Citation Format

Share Document