TY - GEN
T1 - Towards practical security monitors of UML policies for mobile applications
AU - Massacci, F.
AU - Naliuka, K.
PY - 2008
Y1 - 2008
N2 - There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security model based on trust domains nor by current security monitors or language-based security approaches. We propose an approach that allows security policies that are i) expressive enough to capture multiple sessions and interacting applications, ii) suitable for efficient monitoring, iii) convenient for a developer to specify them. Since getting all three at once is impossible, we advocate a logical language, 2D-LTL a bi-dimensional temporal logic fit for multiple sessions and for which efficient monitoring algorithms can be given, and a graphical language based on standard UML sequence diagrams with a tight correspondence between the two. © 2008 IEEE.
AB - There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security model based on trust domains nor by current security monitors or language-based security approaches. We propose an approach that allows security policies that are i) expressive enough to capture multiple sessions and interacting applications, ii) suitable for efficient monitoring, iii) convenient for a developer to specify them. Since getting all three at once is impossible, we advocate a logical language, 2D-LTL a bi-dimensional temporal logic fit for multiple sessions and for which efficient monitoring algorithms can be given, and a graphical language based on standard UML sequence diagrams with a tight correspondence between the two. © 2008 IEEE.
U2 - 10.1109/ARES.2008.191
DO - 10.1109/ARES.2008.191
M3 - Conference contribution
T3 - ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings
SP - 1112
EP - 1119
BT - ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings
T2 - 3rd International Conference on Availability, Security, and Reliability, ARES 2008
Y2 - 4 March 2008 through 7 March 2008
ER -