Conference paper Open Access

Security Type Checking for MILS-AADL Specifications

Pol, Kevin; Noll, Thomas


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.47989</identifier>
  <creators>
    <creator>
      <creatorName>Pol, Kevin</creatorName>
      <givenName>Kevin</givenName>
      <familyName>Pol</familyName>
      <affiliation>Software Modelling and Verification Group, Aachen University</affiliation>
    </creator>
    <creator>
      <creatorName>Noll, Thomas</creatorName>
      <givenName>Thomas</givenName>
      <familyName>Noll</familyName>
      <affiliation>Software Modelling and Verification Group, Aachen University</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Security Type Checking for MILS-AADL Specifications</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2015</publicationYear>
  <subjects>
    <subject>Security</subject>
    <subject>MILS components</subject>
    <subject>information  flow</subject>
    <subject>type system</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2015-01-20</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/47989</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/mils</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="http://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;Information flow policies are widely used for specifying confidentiality and integrity requirements of security-critical systems. In contrast to access control policies and security protocols, they impose global constraints on the information flow and thus provide end-to-end security guarantees. The information flow policy that is usually adopted is non-interference. It postulates that con dential data must not affect the publicly visible behavior of a system. However, this requirement is usually broken in the presence of cryptographic operations. &lt;/p&gt;

&lt;p&gt;In this paper, we provide an extended definition of non-interference for systems that are specified in a MILS variant of the Architecture Analysis and Design Language (AADL). More concretely, we propose a type system for MILS-AADL component definitions that distinguishes between breaking non-interference because of legitimate use of sufficientlynbsp;strong encryption and breaking non-interference due to annbsp;unintended information leak. To this aim, it tracks bothnbsp;intra- and inter-component information flow and considersbr /&amp;gt; both data- and event-flow security./p&amp;gt;&lt;/p&gt;</description>
  </descriptions>
</resource>
12
8
views
downloads
All versions This version
Views 1212
Downloads 88
Data volume 3.2 MB3.2 MB
Unique views 1212
Unique downloads 77

Share

Cite as