DocumentCode
2600916
Title
Constructing secure distributed systems using components
Author
Shi, Qi ; McDermid, J.A.
Author_Institution
Dept. of Comput. Sci., Univ. of York, UK
fYear
1993
fDate
6-8 Oct 1993
Firstpage
143
Lastpage
152
Abstract
Current hookup theories may impose overstrong security requirements on component systems. To overcome this problem, connectivities of the components may have to be considered in order to appropriately handle their composition. Such a consideration is used here to describe composable security properties. Security requirements are enforced only on some input and output entities of each component with regard to its connectivity, and communication constraints on its others so as to ensure that their entire system can satisfy its security requirement. This enables the system and its components to possess different security properties, i.e., the security property of the system can be logically stronger than security properties of its components
Keywords
distributed processing; security of data; communication constraints; composable security properties; connectivity; hookup theories; secure distributed systems; security requirements; Communication system security; Degradation; Identity-based encryption;
fLanguage
English
Publisher
ieee
Conference_Titel
Reliable Distributed Systems, 1993. Proceedings., 12th Symposium on
Conference_Location
Princeton, NJ
Print_ISBN
0-8186-4310-2
Type
conf
DOI
10.1109/RELDIS.1993.393464
Filename
393464
Link To Document