Title :
Constructing secure distributed systems using components
Author :
Shi, Qi ; McDermid, J.A.
Author_Institution :
Dept. of Comput. Sci., Univ. of York, UK
Abstract :
Current hookup theories may impose overstrong security requirements on component systems. To overcome this problem, connectivities of the components may have to be considered in order to appropriately handle their composition. Such a consideration is used here to describe composable security properties. Security requirements are enforced only on some input and output entities of each component with regard to its connectivity, and communication constraints on its others so as to ensure that their entire system can satisfy its security requirement. This enables the system and its components to possess different security properties, i.e., the security property of the system can be logically stronger than security properties of its components
Keywords :
distributed processing; security of data; communication constraints; composable security properties; connectivity; hookup theories; secure distributed systems; security requirements; Communication system security; Degradation; Identity-based encryption;
Conference_Titel :
Reliable Distributed Systems, 1993. Proceedings., 12th Symposium on
Conference_Location :
Princeton, NJ
Print_ISBN :
0-8186-4310-2
DOI :
10.1109/RELDIS.1993.393464