Enforcing Private Policy via Security-by-Contract (Articolo in rivista)

Type
Label
  • Enforcing Private Policy via Security-by-Contract (Articolo in rivista) (literal)
Anno
  • 2010-01-01T00:00:00+01:00 (literal)
Alternative label
  • Matteucci I.; Costa G. (2010)
    Enforcing Private Policy via Security-by-Contract
    in Upgrade (Engl. ed.)
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Matteucci I.; Costa G. (literal)
Pagina inizio
  • 44 (literal)
Pagina fine
  • 52 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
  • Special Issue Identity and Privacy Management (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • XI (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
  • In: UPGRADE The European for the Informatics Professional, vol. XI (1) pp. 44 - 52. CEPIS, 2010. (literal)
Note
  • Google Scholar (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • CNR-IIT, Pisa (literal)
Titolo
  • Enforcing Private Policy via Security-by-Contract (literal)
Abstract
  • This work aims to investigate how the Security-by-Contract (SxC)paradigm, developed for providing security assurances to mobileapplications, can be used for guaranteeing the security ofcommunicating systems composed by several, heterogeneous components.These components need to communicate with each other by establishingdirect, point to point connections. Direct connections can involvecomponents sharing no common communication protocols and need asuitable interface. Enablers are in charge of providing thesecommunication interfaces. Each component has a local security policycomposing a public and a private part. When a communication between twocomponents has to be established, each component asks the enabler toprovide a communication interface that respects its public policy. Weexploit the Security-by-Contract approach for assuring that theapplication implementing the communication interface is always safe,i.e., it satisfies the security policies set by components. Moreover,we present an extension of the Security-by-Contract for dealing withtrust. Trust management is useful when one of the involved actors isconsidered to be potentially untrusted and the others want to measureits trust level. (literal)
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Insieme di parole chiave di
data.CNR.it