Verifying resource access control on mobile interactive devices

被引:1
|
作者
Besson, Frederic [1 ]
Dufay, Guillaume [1 ,3 ]
Jensen, Thomas [2 ]
Pichardie, David [1 ]
机构
[1] Inria Rennes, Campus Beaulieu, Rennes, France
[2] CNRS, Rennes, France
[3] Trusted Labs, Versailles, France
关键词
Resource access control; static analysis;
D O I
10.3233/JCS-2009-0387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by and improves on the Java security architecture used in Java-enabled mobile telephones. We extend the Java model to include access control permissions with multiplicities in order to allow to use a permission a certain number of times. We define a program model based on control flow graphs together with its operational semantics and provide a formal definition of the basic security policy to enforce viz that an application will always ask for a permission before using it to access a resource. A static analysis which enforces the security policy is defined and proved correct. A constraint solving algorithm implementing the analysis is presented.
引用
收藏
页码:971 / 998
页数:28
相关论文
共 50 条
  • [41] ViewMark: An Interactive Videoconferencing System for Mobile Devices
    Shi, Shu
    Zhang, Zhengyou
    2011 IEEE 13TH INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP), 2011,
  • [42] Interactive browsing of image collections on mobile devices
    Gerald Schaefer
    Matthew Tallyn
    Daniel Felton
    William Plant
    David Edmundson
    Multimedia Tools and Applications, 2015, 74 : 8267 - 8277
  • [43] Interactive browsing of image collections on mobile devices
    Schaefer, Gerald
    Tallyn, Matthew
    Felton, Daniel
    Plant, William
    Edmundson, David
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (19) : 8267 - 8277
  • [44] Theme issue on interactive mobile information access
    Fabio Crestani
    Mark Dunlop
    Matt Jones
    Steve Jones
    Stefano Mizzaro
    Personal and Ubiquitous Computing, 2006, 10 : 193 - 194
  • [45] Enhancing access control for mobile devices with an agnostic trust negotiation decision engine
    Diaz-Sanchez, Daniel
    Marin, Andres
    Almenarez, Florina
    PERSONAL WIRELESS COMMUNICATIONS, 2007, 245 : 304 - +
  • [46] An Integrated Routing and Medium Access Control Framework for Surveillance Networks of Mobile Devices
    Martin, Nicholas
    Al-Mousa, Yamin
    Shenoy, Nirmala
    DISTRIBUTED COMPUTING AND NETWORKING, 2011, 6522 : 315 - +
  • [47] Theme issue on interactive mobile information access
    Crestani, Fabio
    Dunlop, Mark
    Jones, Matt
    Jones, Steve
    Mizzaro, Stefano
    PERSONAL AND UBIQUITOUS COMPUTING, 2006, 10 (04) : 193 - 194
  • [48] Wireless, Web-Based Interactive Control of Optical Coherence Tomography with Mobile Devices
    Mehta, Rajvi
    Nankivil, Derek
    Zielinski, David J.
    Waterman, Gar
    Keller, Brenton
    Limkakeng, Alexander T., Jr.
    Kopper, Regis
    Izatt, Joseph A.
    Kuo, Anthony N.
    TRANSLATIONAL VISION SCIENCE & TECHNOLOGY, 2017, 6 (01):
  • [49] A Feedback-Based Control Technique for Interactive Live Streaming Systems to Mobile Devices
    Paravati, Gianluca
    Celozzi, Cesare
    Sanna, Andrea
    Lamberti, Fabrizio
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) : 190 - 197
  • [50] STOVEPipe: Observable Access Control of User Data for Untrusted Applications on Mobile Devices
    Tan, Jiaqi
    Drolia, Utsav
    Martins, Rolando
    Gandhi, Rajeev
    Narasimhan, Priya
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 680 - 683