{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:59Z","timestamp":1750220399147,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,12,31]],"date-time":"2020-12-31T00:00:00Z","timestamp":1609372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Swedish Knowledge Foundation","award":["20160186"],"award-info":[{"award-number":["20160186"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2020,12,31]]},"abstract":"<jats:p>\n            Modern software systems and their corresponding architectures are increasingly decentralized, distributed, and dynamic. As a consequence, decentralized mechanisms are required to ensure security in such architectures. Decentralized Information Flow Control (DIFC) is a mechanism to control information flow in distributed systems. This article presents and discusses several improvements to an adaptive decentralized information flow approach that incorporates trust for decentralized systems to provide security. Adaptive Trust-Aware Decentralized Information Flow (AT-DIFC\n            <jats:sup>+<\/jats:sup>\n            ) combines decentralized information flow control mechanisms, trust-based methods, and decentralized control architectures to control and enforce information flow in an open, decentralized system. We strengthen our approach against newly discovered attacks and provide additional information about its reconfiguration, decentralized control architectures, and reference implementation. We evaluate the effectiveness and performance of AT-DIFC\n            <jats:sup>+<\/jats:sup>\n            on two case studies and perform additional experiments and to gauge the mitigations\u2019 effectiveness against the identified attacks.\n          <\/jats:p>","DOI":"10.1145\/3487292","type":"journal-article","created":{"date-parts":[[2021,12,20]],"date-time":"2021-12-20T19:13:58Z","timestamp":1640027638000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["AT-DIFC\n            <sup>+<\/sup>\n            : Toward Adaptive and Trust-Aware Decentralized Information Flow Control"],"prefix":"10.1145","volume":"15","author":[{"given":"Charilaos","family":"Skandylas","sequence":"first","affiliation":[{"name":"Linnaeus University, V\u00e4xj\u00f6, Sweden"}]},{"given":"Narges","family":"Khakpour","sequence":"additional","affiliation":[{"name":"Linnaeus University, V\u00e4xj\u00f6, Sweden"}]},{"given":"Jesper","family":"Andersson","sequence":"additional","affiliation":[{"name":"Linnaeus University, V\u00e4xj\u00f6, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2021,12,20]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.09.040"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.09.005"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CYBERINCIDENT.2017.8054639"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2014.21"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"M. Dworkin. 2015. FIPS PUB 202 Federal Information Processing Standards. SHA-3 standard: Permutation-based hash and extendable-output functions. NIST 1\u201337.","DOI":"10.6028\/NIST.FIPS.202"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.5555\/800263.809204"},{"key":"e_1_3_1_8_2","first-page":"213","volume-title":"Can We Trust Trust?","author":"Gambetta D.","year":"1988","unstructured":"D. Gambetta. 1988. Can We Trust Trust?Blackwell, Oxford, UK, 213\u2013237."},{"key":"e_1_3_1_9_2","unstructured":"D. Hedin and A. Sabelfeld. 2012. A perspective on information-flow control. In Software Safety and Security . IOS Press 1\u201329."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2019.00023"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0867-0"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.23"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294293"},{"key":"e_1_3_1_15_2","volume-title":"Adaptive Security","author":"Lamprecht C. J.","year":"2012","unstructured":"C. J. Lamprecht. 2012. Adaptive Security. Ph.D. Dissertation. Newcastle University."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241181"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542484"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600181"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465357"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.011"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACSOS49614.2020.00030"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAC.2017.20"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISDEA.2012.17"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3194133.3194155"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1808984.1808994"},{"key":"e_1_3_1_28_2","first-page":"76","volume-title":"On Patterns for Decentralized Control in Self-Adaptive Systems","author":"Weyns D.","year":"2013","unstructured":"D. Weyns, B. Schmerl, V. Grassi, S. Malek, R. Mirandola, C. Prehofer, J. Wuttke, J. Andersson, H. Giese, and K. M. G\u00f6schka. 2013. On Patterns for Decentralized Control in Self-Adaptive Systems. Springer, Berlin, 76\u2013107."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2555611"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465479"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298481"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01955-2"}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:48Z","timestamp":1750191528000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,31]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12,31]]}},"alternative-id":["10.1145\/3487292"],"URL":"https:\/\/doi.org\/10.1145\/3487292","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"type":"print","value":"1556-4665"},{"type":"electronic","value":"1556-4703"}],"subject":[],"published":{"date-parts":[[2020,12,31]]},"assertion":[{"value":"2021-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}