Towards practical security monitors of UML policies for mobile applications

F. Massacci, K. Naliuka

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security model based on trust domains nor by current security monitors or language-based security approaches. We propose an approach that allows security policies that are i) expressive enough to capture multiple sessions and interacting applications, ii) suitable for efficient monitoring, iii) convenient for a developer to specify them. Since getting all three at once is impossible, we advocate a logical language, 2D-LTL a bi-dimensional temporal logic fit for multiple sessions and for which efficient monitoring algorithms can be given, and a graphical language based on standard UML sequence diagrams with a tight correspondence between the two. © 2008 IEEE.
Original languageEnglish
Title of host publicationARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings
Pages1112-1119
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event3rd International Conference on Availability, Security, and Reliability, ARES 2008 - , Spain
Duration: 4 Mar 20087 Mar 2008

Publication series

NameARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings

Conference

Conference3rd International Conference on Availability, Security, and Reliability, ARES 2008
Country/TerritorySpain
Period4/03/087/03/08

Fingerprint

Dive into the research topics of 'Towards practical security monitors of UML policies for mobile applications'. Together they form a unique fingerprint.

Cite this