Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/CSF.2013.13guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Security and Privacy by Declarative Design

Published: 26 June 2013 Publication History

Abstract

The privacy of users has rapidly become one of the most pervasive and stringent requirements in distributed computing. Designing and implementing privacy-preserving distributed systems, however, is challenging since these systems also have to fulfill seemingly conflicting security properties and system requirements: e.g., authorization and accountability require some form of user authentication and session management necessarily involves some form of user tracking.In this work, we present a solution based on declarative design.The core component of our framework is a logic-based declarative API for data processing that exports methods to conveniently specify the system architecture and the intended security properties, and conceals the cryptographic realization.Invisible to the programmer, the implementation of this API relies on a powerful combination of digital signatures, non-interactive zero-knowledge proofs of knowledge, pseudonyms, and reputation lists. We formally proved that the cryptographic implementation enforces the security properties expressed in the declarative specification.The systems produced by our framework enjoy interoperability and open-endedness: they can easily be extended to offer new services and cryptographic data can be shared and processed by different services, without requiring any extra bootstrapping phase or interaction among parties.We implemented the API in Java and conducted an experimental evaluation to demonstrate the practicality of our approach.

Cited By

View all
  • (2018)Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementationsJournal of Computer Security10.5555/2595841.259584522:2(301-353)Online publication date: 24-Dec-2018
  • (2017)A Type System for Privacy PropertiesProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3133998(409-423)Online publication date: 30-Oct-2017
  • (2017)Late Decomposition of Applications into Services through Model-Driven EngineeringProceedings of the XXXI Brazilian Symposium on Software Engineering10.1145/3131151.3131165(164-173)Online publication date: 20-Sep-2017
  • Show More Cited By

Index Terms

  1. Security and Privacy by Declarative Design
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      CSF '13: Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium
      June 2013
      287 pages
      ISBN:9780769550312

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 26 June 2013

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 26 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementationsJournal of Computer Security10.5555/2595841.259584522:2(301-353)Online publication date: 24-Dec-2018
      • (2017)A Type System for Privacy PropertiesProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3133998(409-423)Online publication date: 30-Oct-2017
      • (2017)Late Decomposition of Applications into Services through Model-Driven EngineeringProceedings of the XXXI Brazilian Symposium on Software Engineering10.1145/3131151.3131165(164-173)Online publication date: 20-Sep-2017
      • (2015)PriCLProceedings of the 4th International Conference on Principles of Security and Trust - Volume 903610.1007/978-3-662-46666-7_18(344-363)Online publication date: 11-Apr-2015
      • (2015)Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information LeakageProceedings of the 18th International Conference on Information Security - Volume 929010.1007/978-3-319-23318-5_27(493-510)Online publication date: 9-Sep-2015

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media