• DocumentCode
    2600916
  • Title

    Constructing secure distributed systems using components

  • Author

    Shi, Qi ; McDermid, J.A.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of York, UK
  • fYear
    1993
  • fDate
    6-8 Oct 1993
  • Firstpage
    143
  • Lastpage
    152
  • Abstract
    Current hookup theories may impose overstrong security requirements on component systems. To overcome this problem, connectivities of the components may have to be considered in order to appropriately handle their composition. Such a consideration is used here to describe composable security properties. Security requirements are enforced only on some input and output entities of each component with regard to its connectivity, and communication constraints on its others so as to ensure that their entire system can satisfy its security requirement. This enables the system and its components to possess different security properties, i.e., the security property of the system can be logically stronger than security properties of its components
  • Keywords
    distributed processing; security of data; communication constraints; composable security properties; connectivity; hookup theories; secure distributed systems; security requirements; Communication system security; Degradation; Identity-based encryption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Reliable Distributed Systems, 1993. Proceedings., 12th Symposium on
  • Conference_Location
    Princeton, NJ
  • Print_ISBN
    0-8186-4310-2
  • Type

    conf

  • DOI
    10.1109/RELDIS.1993.393464
  • Filename
    393464