Confidentiality-preserving refinement is compositional - Sometimes

被引:0
|
作者
Santen, T [1 ]
Heisel, M
Pfitzmann, A
机构
[1] Tech Univ Berlin, Inst Softwaretechn & Theoret Informat, Berlin, Germany
[2] Tech Univ Ilmenau, Inst Prakt Informat & Medieninformat, D-98684 Ilmenau, Germany
[3] Tech Univ Dresden, Fak Informat, D-8027 Dresden, Germany
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Confidentiality-preserving refinement describes a relation between a specification and an implementation that ensures that all confidentiality properties required in the specification are preserved by the implementation in a probabilistic setting. The present paper investigates the condition under which that notion of refinement is compositional, i.e. the condition under which refining a subsystem of a larger system yields a confidentiality-preserving refinement of the larger system. It turns out that the refinement relation is not composition in general, but the condition for compositionality can be stated in a way that builds on the analysis of subsystems thus aiding system designers in analyzing a composition.
引用
收藏
页码:194 / 211
页数:18
相关论文
共 50 条
  • [1] Confidentiality-preserving refinement
    Heisel, M
    Pfitzmann, A
    Santen, T
    [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 295 - 305
  • [2] A formal framework for confidentiality-preserving refinement
    Santen, Thomas
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 225 - 242
  • [3] Pattern-Based Confidentiality-Preserving Refinement
    Schmidt, Holger
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 43 - 59
  • [4] Confidentiality-Preserving Publish/Subscribe: A Survey
    Onica, Emanuel
    Felber, Pascal
    Mercier, Hugues
    Riviere, Etienne
    [J]. ACM COMPUTING SURVEYS, 2016, 49 (02)
  • [5] Confidentiality-Preserving Publicly Verifiable Computation
    Sun, Jiameng
    Zhu, Binrui
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 799 - 818
  • [6] An efficient confidentiality-preserving Proof of Ownership for deduplication
    Gonzalez-Manzano, Lorena
    Orfila, Agustin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 50 : 49 - 59
  • [7] Controlled Management of Confidentiality-Preserving Relational Interactions
    Biskup, Joachim
    Menzel, Ralf
    Zarouali, Jaouad
    [J]. DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 61 - 77
  • [8] Confidentiality-Preserving Rank-Ordered Search
    Swaminathan, A.
    Mao, Y.
    Su, G. -M.
    Gou, H.
    Varna, A.
    He, S.
    Wu, M.
    Oard, D.
    [J]. STORAGE SS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON STORAGE SECURITY AND SURVIVABILITY, 2007, : 7 - +
  • [9] Confidentiality-Preserving Optimal Power Flow for Cloud Computing
    Borden, Alex R.
    Molzahn, Daniel K.
    Ramanathan, Parmeswaran
    Lesieutre, Bernard C.
    [J]. 2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1300 - 1307
  • [10] On Confidentiality-Preserving Real-Time Locking Protocols
    Voelp, Marcus
    Engel, Benjamin
    Hamann, Claude-Joachim
    Haertig, Hermann
    [J]. 2013 IEEE 19TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS), 2013, : 153 - 161