From Authorization Logics to Types for Authorization

被引:0
|
作者
Jagadeesan, Radha [1 ]
机构
[1] Depaul Univ, Coll CDM, Sch CTI, Chicago, IL 60604 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Web services and mashups are collaborative distributed systems built by assembling components from multiple independent applications. Such composition and aggregation involves subtle combinations of authorization, delegation, and trust. Consequently, how to do so securely remains a topic of current research. Authorization logics elegantly record the change of context from sender to receiver when messages are transmitted in distributed systems. Such logics are well suited to specify security policies since they satisfy a non-interference property: namely, that the dependencies between the statements of principals arise solely from the user-defined non-logical axioms. Building on the prior work of Abadi, Abadi and Garg, and Garg and Pfenning, we describe a semantic approach to such non-interference results. Authorization logics constitute the logical foundations of our type-effect system for TAPIDO, a calculus of distributed objects. The effects are "object-centric" and record the rights associated with the object. Object effects are validated at; the point of creation, ensuring that the security policy permits the creation of the object. When such all object is received, the associated rights, perhaps constrained by provenance information, ire delegated as a benefit accrued to the recipient. A TAPIDO program is safe if every object creation at runtime is in conformance with the security policy of the system. Well-typed programs are safe even in the face of dishonest opponent processes that aim to subvert the global authorization policy by creating unauthorized objects. This talk is based on joint work with Abramsky and joint work with Cirillo, Pitcher and Riely.
引用
收藏
页码:255 / 255
页数:1
相关论文
共 50 条
  • [1] On the Complexity of Linear Authorization Logics
    Nigam, Vivek
    [J]. 2012 27TH ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS), 2012, : 511 - 520
  • [2] A framework for linear authorization logics
    Nigam, Vivek
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 536 : 21 - 41
  • [3] Affine Refinement Types for Authentication and Authorization
    Bugliesi, Michele
    Calzavara, Stefano
    Eigner, Fabienne
    Maffei, Matteo
    [J]. TRUSTWORTHY GLOBAL COMPUTING, TGC 2013, 2013, 8358 : 19 - 33
  • [4] Types and Abstract Interpretation for Authorization Hook Advice
    Skalka, Christian
    Darais, David
    Jaeger, Trent
    Capobianco, Frank
    [J]. 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 139 - 152
  • [5] Authorization
    不详
    [J]. NUCLEAR PLANT JOURNAL, 2000, 18 (01) : 12 - 12
  • [6] Maille Authorization A Distributed, Redundant Authorization Protocol
    Fritz, Andrew
    Paris, Jehan-Francois
    [J]. 2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 265 - +
  • [7] Multilayer authorization model and analysis of authorization methods
    Ugur, Alper
    Sogukpinar, Ibrahim
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2016, 24 (06) : 4915 - 4934
  • [8] A framework for multiple authorization types in a healthcare application system
    Chandramouli, R
    [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 137 - 148
  • [9] Use of medicine without authorization or without authorization in children
    Knöppel, C
    Klinger, O
    Soergel, M
    Seyberth, HW
    Leonhardt, A
    [J]. MONATSSCHRIFT KINDERHEILKUNDE, 2000, 148 (10) : 904 - 908
  • [10] AUTHORIZATION FOR ENCLOSIERES
    AGENA, CA
    [J]. PRAKTISCHE TIERARZT, 1986, 67 (01): : 9 - &