Skip to main content

Privacy Enforcement and Analysis for Functional Active Objects

  • Conference paper
Data Privacy Management and Autonomous Spontaneous Security (DPM 2010, SETOP 2010)

Abstract

In this paper we present an approach for the enforcement of privacy in distributed active object systems, illustrate its implementation in the language ASPfun, and formally prove privacy based on information flow security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Cardelli, L.: A Theory of Objects. Springer, New York (1996)

    Book  MATH  Google Scholar 

  2. Bauer, J., Nielson, F., Riis-Nielson, H., Pilegaard, H.: Relational analysis of correlation. In: Alpuente, M., Vidal, G. (eds.) SAS 2008. LNCS, vol. 5079, pp. 32–46. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Caromel, D., Henrio, L.: A Theory of Distributed Objects. Springer, New York (2005)

    MATH  Google Scholar 

  4. Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. Journal of Computer Security 3(1), 5–33 (1995)

    Article  Google Scholar 

  5. Fleck, A., Kammüller, F.: Implementing privacy with erlang active objects. In: 5th International Conference on Internet Monitoring and Protection, ICIMP 2010. IEEE, Los Alamitos (2010)

    Google Scholar 

  6. Henrio, L., Kammüller, F.: Functional active objects: Typing and formalisation. In: 8th International Workshop on the Foundations of Coordination Languages and Software Architectures, FOCLASA 2009. ENTCS. Elsevier, Amsterdam (2009); Also invited for journal publication in Science of Computer Programming, Elsevier

    Google Scholar 

  7. Kammüller, F.: Using functional active objects to enforce privacy. In: 5th Conf. on Network Architectures and Information Systems Security, SAR-SSI 2010 (2010)

    Google Scholar 

  8. Mantel, H.: Possibilistic definitions of security – an assembly kit. In: Computer Security Foundations Workshop, pp. 185–199. IEEE, Los Alamitos (2000)

    Google Scholar 

  9. Mantel, H.: On the composition of secure systems. In: Symposium on Security and Privacy (2002)

    Google Scholar 

  10. Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology 9, 410–442 (2000)

    Article  Google Scholar 

  11. Myers, A.C.: Jflow: Practical mostly-static information flow control. In: 26th ACM Symposium on Principles of Programming Languages, POPL 1999 (1999)

    Google Scholar 

  12. ProActive API and environment (2008), http://www.inria.fr/oasis/proactive (under LGPL)

  13. Sabelfeld, A., Myers, A.C.: Language-based information-flow security. Selected Areas in Communications 21, 5–19 (2003)

    Article  Google Scholar 

  14. Zheng, L., Myers, A.C.: Dynamic security labels and static information flow control. International Journal of Information Security 6(2-3) (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kammüller, F. (2011). Privacy Enforcement and Analysis for Functional Active Objects. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2010 2010. Lecture Notes in Computer Science, vol 6514. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19348-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19348-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19347-7

  • Online ISBN: 978-3-642-19348-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics