Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting
Electronic Notes in Theoretical Computer Science (ENTCS)
Types and trace effects of higher order programs
Journal of Functional Programming
Spatial-behavioral types for concurrency and resource control in distributed systems
Theoretical Computer Science
Types and trace effects for object orientation
Higher-Order and Symbolic Computation
Local policies for resource usage analysis
ACM Transactions on Programming Languages and Systems (TOPLAS)
Planning and verifying service composition
Journal of Computer Security - 18th IEEE Computer Security Foundations Symposium (CSF 18)
Spatial-behavioral types, distributed services, and resources
TGC'06 Proceedings of the 2nd international conference on Trustworthy global computing
Foundations of security analysis and design IV
Augmenting trust establishment in dynamic systems with social networks
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Improving the trustworthiness of service QoS information in service-based systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Call-by-contract for service discovery, orchestration and recovery
Rigorous software engineering for service-oriented systems
Rigorous software engineering for service-oriented systems
Checking risky events is enough for local policies
ICTCS'05 Proceedings of the 9th Italian conference on Theoretical Computer Science
HBAC: a model for history-based access control and its model checking
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Security issues in service composition
FMOODS'06 Proceedings of the 8th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
Unblockable compositions of software components
Proceedings of the 15th ACM SIGSOFT symposium on Component Based Software Engineering
A framework for automatic generation of security controller
Software Testing, Verification & Reliability
Hi-index | 0.00 |
A static approach is proposed to study secure composition of software.We extend the ë-calculuswith primitives for invoking services that respect given security requirements. Security-critical code is enclosed in policy framings with a possibly nested, local scope. Policy framings enforce safety and liveness properties of execution histories. The actual histories that can occur at runtime are over-approximated by a type and effect system. These approximations aremodel-checked to verify policy framings within their scopes. This allows for removing any runtime execution monitor, and for selecting those services that match the security requirements.