In this technical report we provide the documentation of the functional requirements of a component-based system representing the IT infrastructure supermarket along with the description of confidentiality properties in the form of information flow requirements for the system. From an architectural point of view, we describe for each interface all services on a functional level. We identify a number of possible attackers and assign for each attacker what inputs to the system she may gain knowledge about and which outputs she may be able to observe. The architecture and security properties of the system are modeled using an extension of the Palladio Component Model
Computing systems are complex machines comprised of many disparate components working together to fu...
This paper proposes an approach of defining systems-level security properties of component-based com...
The methodology in this paper will let designers specify the security properties defined through the...
Since cyber-physical systems are inherently vulnerable to information leaks, software architects nee...
In this paper, we propose a simple security characterisation model for software components. The prop...
The paper proposes a security characterization structure of software components and their compositio...
Computer security is an important issue in determining the dependability of computer systems. It bec...
Many software systems have to be designed and developed in a way that guarantees that specific infor...
International audienceThis paper proposes a formal framework for studying information flow security ...
Software systems are increasingly being assembled from components that are developed by and purchase...
This paper addresses composability properties of component systems. By means of analysis of external...
The goal of this thesis is to provide models and tools to simplify secured component-based distribut...
In cyber-physical systems, which are the integrations of computational and physical processes, secur...
We provide a classification of noninterference-based security properties for the formal analysis of ...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
Computing systems are complex machines comprised of many disparate components working together to fu...
This paper proposes an approach of defining systems-level security properties of component-based com...
The methodology in this paper will let designers specify the security properties defined through the...
Since cyber-physical systems are inherently vulnerable to information leaks, software architects nee...
In this paper, we propose a simple security characterisation model for software components. The prop...
The paper proposes a security characterization structure of software components and their compositio...
Computer security is an important issue in determining the dependability of computer systems. It bec...
Many software systems have to be designed and developed in a way that guarantees that specific infor...
International audienceThis paper proposes a formal framework for studying information flow security ...
Software systems are increasingly being assembled from components that are developed by and purchase...
This paper addresses composability properties of component systems. By means of analysis of external...
The goal of this thesis is to provide models and tools to simplify secured component-based distribut...
In cyber-physical systems, which are the integrations of computational and physical processes, secur...
We provide a classification of noninterference-based security properties for the formal analysis of ...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
Computing systems are complex machines comprised of many disparate components working together to fu...
This paper proposes an approach of defining systems-level security properties of component-based com...
The methodology in this paper will let designers specify the security properties defined through the...