Skip to main content Link Menu Expand (external link) Document Search Copy Copied

From Distributed Computing to Microarchitectures

Faceted Data

Read Schmitz et al (2016) article about faceted data.

  • Do you think this is a good approach to protect systems from data leakage? What are the pros and cons?
  • Create a basic outline design of how you would create such a system in Python.

Note: This article was quite difficult to read, it was quite complex, as a recommendation the Tutor stated we just had to go through the abstract and introduction.

Answers

  • The approach described by the authors seems to be a good approach, but it is also quite complex. I would list the compatibility of their solution to integrate into other languages without any need for modification to be a pro including the expressive way to handle control and data paths while utilizing Haskell. However, their approach utilizes Haskell, a functional programming language, this increases the complexity as although their solution is compatible with other languages, implementing a solution that programmers struggle to understand may become more of a hindrance and security issue as maintaining the codebase will become difficult.

  • Basic Design Outline in Python:

    • Identify Sensitive Data: Clearly define the data that needs protection and determine the specific information flow policies to be enforced.
    • Test and Validate: Design and execute comprehensive test cases to ensure the functionality and security guarantees of the system. Test different scenarios involving various privilege levels and sensitive data to validate the expected behaviour.
    • Documentation: Provide thorough documentation, including clear explanations of the concepts, API references, and usage guidelines. This documentation will help developers understand and effectively utilize the library securely.

Seminar 5 Preparation

  • Read the paper: S. Fiore et al. (2019) (in your reading list for this week). Making reference to page 117659 and the paragraph which begins, “Through an API or via web pages, …”, write a similar paragraph which is applicable for the system that you have designed and developed.”

Paragraph

Through a RESTful API and web pages, the Dutch Forensics Reporting System provides: i) authentication (sign in, sign out, create employee accounts, delete employee accounts), ii) authorization (admin role can view/delete/change the status of public and employee vulnerability reports, admin role can create/delete employee accounts, admin role can view/action event logs, employee role can create/delete/update vulnerability report, employee role can update (own) account.), iii) vulnerability reporting (public users can report vulnerabilities) and iv) additional features (public users can request deletion of submitted information, public users can receive emails when the status of their report is changed)