Verifying resource access control on mobile interactive devices

被引:1
|
作者
Besson, Frederic [1 ]
Dufay, Guillaume [1 ,3 ]
Jensen, Thomas [2 ]
Pichardie, David [1 ]
机构
[1] Inria Rennes, Campus Beaulieu, Rennes, France
[2] CNRS, Rennes, France
[3] Trusted Labs, Versailles, France
关键词
Resource access control; static analysis;
D O I
10.3233/JCS-2009-0387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operational semantics and provide a formal definition of the basic security policy to enforce viz that an application will always ask for a permission before using it to access a resource. A static analysis which enforces the security policy is defined and proved correct. A constraint solving algorithm implementing the analysis is presented.
引用
收藏
页码:971 / 998
页数:28
相关论文
共 50 条
  • [21] Capturing policies for fine-grained access control on mobile devices
    Das, Prajit Kumar
    Joshi, Anupam
    Finin, Tim
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 54 - 63
  • [22] Exploring a Context-based Network Access Control for Mobile Devices
    Mowafi, Yaser
    Abou-Tair, Dhiah el Diehn I.
    Zmily, Ahmad
    Al-Aqarbeh, Tareq
    Abilov, Marat
    Dmitriyevr, Viktor
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 : 547 - 554
  • [23] Fine-Grained Access Control for RDF Data on Mobile Devices
    Sacco, Owen
    Collina, Matteo
    Schiele, Gregor
    Corazza, Giovanni Emanuele
    Breslin, John G.
    Hauswirth, Manfred
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013, PT I, 2013, 8180 : 478 - 487
  • [24] Modeling and verifying strong cache consistency for mobile data access
    Wei, J
    Cheung, SC
    Zhou, H
    Wang, X
    Li, J
    Feng, YL
    12TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2001, : 103 - 111
  • [25] Mobile learning. Mobile devices as an educational resource
    Mojarro-Aliano, Angel
    COMUNICAR, 2014, 21 (42) : 240 - 240
  • [26] Mobile learning. Mobile devices as an educational resource
    Cebrian de la Serna, Manuel
    PROFESORADO-REVISTA DE CURRICULUM Y FORMACION DE PROFESORADO, 2011, 15 (01): : 336 - 337
  • [27] Mobile learning. The mobile devices as an educational resource
    Diaz, Jose Quintanal
    RIED-REVISTA IBEROAMERICANA DE EDUCACION A DISTANCIA, 2011, 14 (02): : 212 - 214
  • [28] Mobile resource guarantees for smart devices
    Aspinall, D
    Gilmore, S
    Hofmann, M
    Sannella, D
    Stark, I
    CONSTRUCTION AND ANALYSIS OF SAFE, SECURE, AND INTEROPERABLE SMART DEVICES, 2005, 3362 : 1 - 26
  • [29] Expressive Policy-Based Access Control for Resource-Constrained Devices
    Uriarte, Mikel
    Astorga, Jasone
    Jacob, Eduardo
    Huarte, Maider
    Carnerero, Manuel
    IEEE ACCESS, 2018, 6 : 15 - 46
  • [30] Interactive Context for Mobile OS Resource Management
    Zhu, Meng
    Shen, Kai
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (03) : 612 - 623