Privacy Enforcement and Analysis for Functional Active Objects

  • Florian Kammüller
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6514)


In this paper we present an approach for the enforcement of privacy in distributed active object systems, illustrate its implementation in the language ASPfun, and formally prove privacy based on information flow security.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AC96]
    Abadi, M., Cardelli, L.: A Theory of Objects. Springer, New York (1996)CrossRefzbMATHGoogle Scholar
  2. [BNRNP08]
    Bauer, J., Nielson, F., Riis-Nielson, H., Pilegaard, H.: Relational analysis of correlation. In: Alpuente, M., Vidal, G. (eds.) SAS 2008. LNCS, vol. 5079, pp. 32–46. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. [CH05]
    Caromel, D., Henrio, L.: A Theory of Distributed Objects. Springer, New York (2005)zbMATHGoogle Scholar
  4. [FG95]
    Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. Journal of Computer Security 3(1), 5–33 (1995)CrossRefGoogle Scholar
  5. [FK10]
    Fleck, A., Kammüller, F.: Implementing privacy with erlang active objects. In: 5th International Conference on Internet Monitoring and Protection, ICIMP 2010. IEEE, Los Alamitos (2010)Google Scholar
  6. [HK09]
    Henrio, L., Kammüller, F.: Functional active objects: Typing and formalisation. In: 8th International Workshop on the Foundations of Coordination Languages and Software Architectures, FOCLASA 2009. ENTCS. Elsevier, Amsterdam (2009); Also invited for journal publication in Science of Computer Programming, ElsevierGoogle Scholar
  7. [Kam10]
    Kammüller, F.: Using functional active objects to enforce privacy. In: 5th Conf. on Network Architectures and Information Systems Security, SAR-SSI 2010 (2010)Google Scholar
  8. [Man00]
    Mantel, H.: Possibilistic definitions of security – an assembly kit. In: Computer Security Foundations Workshop, pp. 185–199. IEEE, Los Alamitos (2000)Google Scholar
  9. [Man02]
    Mantel, H.: On the composition of secure systems. In: Symposium on Security and Privacy (2002)Google Scholar
  10. [ML00]
    Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology 9, 410–442 (2000)CrossRefGoogle Scholar
  11. [Mye99]
    Myers, A.C.: Jflow: Practical mostly-static information flow control. In: 26th ACM Symposium on Principles of Programming Languages, POPL 1999 (1999)Google Scholar
  12. [Pro08]
    ProActive API and environment (2008), (under LGPL)
  13. [SM03]
    Sabelfeld, A., Myers, A.C.: Language-based information-flow security. Selected Areas in Communications 21, 5–19 (2003)CrossRefGoogle Scholar
  14. [ZM07]
    Zheng, L., Myers, A.C.: Dynamic security labels and static information flow control. International Journal of Information Security 6(2-3) (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Florian Kammüller
    • 1
    • 2
  1. 1.Middlesex UniversityLondonUK
  2. 2.Technische UniversitätBerlinGermany

Personalised recommendations