Verifying resource access control on mobile interactive devices

被引:1
|
作者
Besson, Frederic [1 ]
Dufay, Guillaume [1 ,3 ]
Jensen, Thomas [2 ]
Pichardie, David [1 ]
机构
[1] Inria Rennes, Campus Beaulieu, Rennes, France
[2] CNRS, Rennes, France
[3] Trusted Labs, Versailles, France
关键词
Resource access control; static analysis;
D O I
10.3233/JCS-2009-0387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operational semantics and provide a formal definition of the basic security policy to enforce viz that an application will always ask for a permission before using it to access a resource. A static analysis which enforces the security policy is defined and proved correct. A constraint solving algorithm implementing the analysis is presented.
引用
收藏
页码:971 / 998
页数:28
相关论文
共 50 条
  • [1] A formal model of access control for mobile interactive devices
    Besson, Frederic
    Dufay, Guillaume
    Jensen, Thomas
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 110 - +
  • [2] A Framework for the Analysis of Access Control Models for Interactive Mobile Devices
    Manuel Crespo, Juan
    Betarte, Gustavo
    Luna, Carlos
    TYPES FOR PROOFS AND PROGRAMS, 2009, 5497 : 49 - +
  • [3] A framework for the analysis of access control models for interactive mobile devices
    FCEIA, Universidad Nacional de Rosario, Argentina
    不详
    不详
    Lect. Notes Comput. Sci., (49-63):
  • [4] Interactive (stereoscopic) DICOM image access on mobile devices
    Melzer, K
    Lipinski, HG
    Grönemeyer, DHW
    CARS 2002: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2002, : 1051 - 1051
  • [5] Access control for future mobile devices
    Chen, HY
    Sivakumar, TVLN
    2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1527 - 1532
  • [6] GeoSpatial Access Control for Mobile Devices
    Arunkumar, Saritha
    Soyluoglu, Berker
    Sensoy, Murat
    Srivatsa, Mudhakar
    Rajarajan, Muttukrishnan
    2015 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2015, : 86 - 89
  • [7] Resource and Execution Control for Mobile Offloadee Devices
    Zimmermann, Torsten
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Steinhaus, Christian
    Wehrle, Klaus
    2017 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2017, : 316 - 324
  • [8] Resource access control in systems of mobile agents
    Hennessy, M
    Riely, J
    INFORMATION AND COMPUTATION, 2002, 173 (01) : 82 - 120
  • [9] Semantic Access Control for Corporate Mobile Devices
    Ercan, Tuncay
    Yildiz, Mehmet
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT 2, PROCEEDINGS, 2010, 6082 : 198 - +
  • [10] Sensitivity analysis on resource access control in mobile networks
    Chen, H
    Cheng, CC
    Chi, MH
    Yeh, HH
    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS V, 2004, 5601 : 214 - 224